Most Popular Courses

Remote Support for Administrators

Available Training Types:

  • Public Shared Training
  • Private Dedicated Training
  • Onsite Training

This course is designed for system/network administrators who want to learn how to configure and extend Remote Support for their unique environment. During the course administrators will learn how to efficiently administer and configure Remote Support on an ongoing basis focusing on these learning objectives: Setting Remote Support up for Success, Establishing Security Policies, Mastering Support Options, Customizing the Customer Experience, and Optimizing Session Data Reporting and Archival. This course includes a hands-on lab with exercises for students to practice what they learn. This course is offered as a two-day on-site course, or as a virtual course delivered over 4 half days.

Download the Data Sheet Request Information

Upcoming Classes

  • ; (Eastern) each day
  • ; (Eastern) each day
  • ; (Eastern) each day
  • ; (Eastern) each day

Representative Essentials

Available Training Types:

  • eLearning
  • Private Dedicated Training
  • Onsite Training

Ideal for help desk analysts, support professionals and managers, this course provides a solid understanding of the Representative Console, and what your customer sees during a support session. During the half-day course, your support representatives will become knowledgeable in session initiation, troubleshooting tools, session management and other support features. As a result, reps gain confidence and greater efficiency when initiating sessions and resolving customer issues. (Offered on-site, virtual or on-demand)

Download the Data Sheet Request Information

Remote Support Chat Implementation

Available Training Types:

  • Private Dedicated Training
  • Onsite Training

The Remote Support Chat Implementation Service is designed to enhance the efficiency of your organization and maximize your return on your investment. Chat enables support organizations to deliver a better customer service experience at a lower cost. With Chat deployments, your representatives can connect to a chat session with your customer, and quickly elevate to a full remote control session.

Privileged Remote Access for Administrators

Available Training Types:

  • Public Shared Training
  • Private Dedicated Training
  • Onsite Training

This course is designed for system/network administrators who want to learn how to configure Privileged Remote Access in the network and manage secure access to critical systems utilizing our patented Jump Technology and other access features. During the course administrators will learn how to efficiently administer and configure Privileged Remote Access on an ongoing basis for optimized security. This course focuses on these learning objectives: Setting up for Success, Establish Secure Endpoint Access, Mastering Access Console Security, and Endpoint Configuration. This course includes a hands-on lab with exercises for students to practice what they learn. This course is offered with the following options: As an on-site course, delivered over one and a half days. As a virtual course delivered, over two half-days. As a public shared course that is licensed per student. As a private course that is exclusive to your organization.

Download the Data Sheet Request Information

Upcoming Classes

  • ; (Eastern) each day
  • ; (Eastern) each day
  • ; (Eastern) each day

Privileged Remote Access Console

Available Training Types:

  • eLearning
  • Public Shared Training
  • Private Dedicated Training
  • Onsite Training

The Privileged Remote Access Console course is ideal for any resource who plans to connect to endpoints using the Access Console. During this course your Access Console users will learn how to install the console and access remote endpoints using the consoles. This course is available virtual or onsite, so your team can engage in learning from any location. The course length is three hours on-site or virtually. This course is led by a certified instructor.

Download the Data Sheet Request Information

Privileged Remote Access Vendor Onboarding

Available Training Types:

  • eLearning

The Privileged Remote Access Vendor Onboarding service describes how to securely deploy, monitor, and control endpoints, and guides vendors who will be using the Access Console to access critical systems within your infrastructure.

Download the Data Sheet Request Information

Password Safe Foundations

Available Training Types:

  • eLearning
  • Public Shared Training
  • Private Dedicated Training
  • Onsite Training

The Password Safe Foundations Training is designed for the IT security professional tasked with administering, monitoring and reporting on Password Safe. Students learn how to install and configure Retina Network Security Scanner and BeyondInsight Console, Configure BeyondInsight’s Analytics & Reporting, configure functional accounts and password rules, add managed systems, setup Accounts and Roles, request, approve and view recorded sessions through the Password Safe web client, work with Smart Rules & Groups, schedule scans for new systems and users, and onboard with Smart Rule, setup and configure Remote Apps and troubleshoot SSH & RDP session connections.

Download the Data Sheet Request Information

Upcoming Classes

  • ; (Eastern) each day
  • ; (Eastern) each day
  • ; (Eastern) each day
  • ; (Eastern) each day

Privilege Management for Unix/Linux (PowerBroker for Unix & Linux Foundations)

Available Training Types:

  • eLearning
  • Public Shared Training
  • Private Dedicated Training
  • Onsite Training

This course is designed for the IT security professional tasked with installation, administering, monitoring and reporting on PowerBroker for Unix & Linux. Students learn how to install the products components, identify and edit configuration files, create policy for privilege delegation, install the components needed for I/O log review, and use the Analytics and Reporting from within BeyondInsight.

Download the Data Sheet Request Information

Upcoming Classes

  • ; (Eastern) each day

Privilege Management for Windows (PowerBroker for Windows Foundations)

Available Training Types:

  • eLearning
  • Public Shared Training
  • Private Dedicated Training
  • Onsite Training

This course is designed for the IT security professional tasked with administering, monitoring and reporting on PowerBroker for Windows. Students learn how to install the products components, create path, publisher & shell rules for privilege delegation, customize user messages, setup secondary authorization and challenge/response mechanisms. They will create risk & compliance rules, and file integrity rules. They will learn how to use BeyondInsight to review event data, create new rules from captured events, and setup and view captured sessions.

Download the Data Sheet Request Information

Upcoming Classes

  • ; (Eastern) each day
  • ; (Eastern) each day

Enterprise Vulnerability Management Foundations (Retina CS)

Available Training Types:

  • eLearning
  • Public Shared Training
  • Private Dedicated Training
  • Onsite Training

This course is designed for the IT security professional tasked with installation, administering, monitoring and reporting on Enterprise Vulnerability Management. Students learn how to install the products components, run network-based vulnerability scans, create Smart Rules, navigate the BeyondInsight interface and examine vulnerability findings, create pivot grids and use BeyondInsight’s Analytics and Reporting.

Download the Data Sheet Request Information

Upcoming Classes

  • ; (Eastern) each day
  • ; (Eastern) each day

AD Bridge Foundations (Powered by Powerbroker Identity Services)

Available Training Types:

  • eLearning
  • Public Shared Training
  • Private Dedicated Training
  • Onsite Training

The AD Bridge Foundations Training is designed for the IT security management professional tasked with administering, monitoring and reporting on AD Bridge. Students learn how to install and configure all product components, including the Management Console, Reporting Database and operating system Agents. They will connect a Unix host to Active Directory, create and configure Group Policy Objects, configure Active Directory users for Unix/Linux logon via console, SSH & PuTTY.

Download the Data Sheet Request Information

Upcoming Classes

    Privilege Management for Desktops (Defendpoint Foundations)

    Available Training Types:

    • Public Shared Training
    • Private Dedicated Training
    • Onsite Training

    This course is ideal for security professionals who need to learn how to deploy, configure,and utilize Privilege Management for Desktops in their unique environment. During the course, you will learn best practices for installing and administering Privilege Management for Desktops (Defendpoint).

    Download the Data Sheet Request Information

    Upcoming Classes

    • iC3: ; (Eastern) each day
    • GPO: ; (Eastern) each day
    • GPO: ; (Eastern) each day
    • ePO: ; (Eastern) each day
    • iC3: ; (Eastern) each day
    • iC3: ; (Eastern) each day

    Privilege Management for Desktops Advanced (Defendpoint Advanced)

    Available Training Types:

    • Public Shared Training
    • Private Dedicated Training
    • Onsite Training

    The Privilege Management for Desktops Advanced course builds on the Foundations course with advanced topics. The core training will improve your understanding of the architecture and operation of the software in your environment, as well as providing troubleshooting processes. Additional eLearning options focus on enterprise reporting options, using Privilege Management for Desktops with macOS, and managing your system using iC3. Security professionals who complete this course can receive a certification. The Privilege Management for Desktops Foundations course is a prerequisite for taking this course.

    Download the Data Sheet Request Information

    Upcoming Classes

    • ePO: ; (Eastern) each day
    • iC3: ; (Eastern) each day
    • GPO: ; (Eastern) each day
    • GPO: ; (Eastern) each day
    • ePO: ; (Eastern) each day
    • iC3: ; (Eastern) each day
    • iC3: ; (Eastern) each day

    Privileged Identity for Administrators

    Available Training Types:

    • Public Shared Training
    • Private Dedicated Training
    • Onsite Training

    Privileged Identity for Administrators is a 15-hour course, delivered in five-hour increments over three days. Once enrolled in a course the system will generate three calendar invites, one for each day of the course. Each invite contains the link for a web-based presentation with two-way VoIP (computer) or phone audio. This course is designed for IT professionals who want to learn how to deploy, configure, and extend Privileged Identity for their unique environment. During the course, you will learn how to install and administer the software. This course is focused on these learning objectives: how to install and upgrade, understand the Privileged Identity architecture and key components, define and configure the privileged identity management strategy. This course includes a hands-on lab with exercises for students to practice what they learned.

    Download the Data Sheet Request Information

    Upcoming Classes

    • ; (Eastern) each day

    Contact Us