Privileged Access Management Training Course – PAM in MIM (A640)

Privileged Access Management Training Course – PAM in MIM (A640)

Fantastic as always. Paul is an amazing teacher and really takes the time to help you understand inherently complex technologies.

Callum P, Identity & Access Management Specialist, UK. 2018

Live Instructor-Led Course

£495 / $650 / €580

Available as a private course

Find out more about private training or ask us about it here.

This course is for technical staff – engineers, developers and technical architects – who want to maximise security by implementing MIM’s Privileged Access Management (PAM).

Read what students say about this course.

No MIM experience? No problem! Relevant concepts will be covered. However, to implement PAM successfully, we recommend that you also take our MIM Foundation course (available as a live classroom course and as an online course).

What does the course cover? Through presentations, discussions, demonstrations and exercises, the course will cover the following areas:

  • Introduction to Privileged Access Management: What Privileged Access is, how to recognise it, threats and consequences of identity theft and possible countermeasures.
  • MIM PAM Concepts and Components: User experience and underlying technology in MIM PAM.
  • Configuring and Operating PAM: Technical configuration of PAM, organizational components of a PAM project, and implementation of PAM in MIM.
  • See the course outline for what you’ll learn.

What will I learn? At the end of the course, you will:

  • Understand the threats and consequences of identity theft, and how and why implementing PAM in MIM increases security.
  • Be able to design a PAM project.
  • Know how to implement and operate the PAM components of a MIM PAM environment.

Prepare! Be sure to read our PAM white paper and listen to this recording of our PAM webinar.

This course is available: live instructor-led in the classroom or via Skype | private training in the classroom or via Skype

Introduction

Privileged Access Management (PAM) addresses a problem which has often been neglected, that is, the detailed management of administrative, or privileged, permissions. In other words, PAM can keep safe those who have the keys to your kingdom.

IT security breaches are all too common, as are attacks using stolen credentials of those with privileged permissions. Stolen admin accounts enable attackers to extract and damage data, delete or modify logs, and create new backdoor accounts to prevent their detection from the attacked system.

Privileged Access Management (PAM) is a powerful security feature in Microsoft Identity Manager (MIM) which can limit the exposure of administrative credentials to attackers, and help prevent their theft and misuse.A PAM implementation of MIM is quite different from a standard MIM implementation. It’s far from straightforward, and a poorly designed and implemented PAM process will not significantly or meaningfully improve overall system security.

Module 1: Introduction to Privileged Access Management

In this module, the threat of identity theft and possible counter measures are discussed. We clearly define the term Privileged Access and identify the vulnerabilities in Windows that proper management can mitigate. This includes the problems associated with granting some identities permanent privileges when a “Just In Time” privilege escalation approach will provide higher levels of security. We discuss how attackers can compromise the Windows Credential Cache in non-secured environments.

Module 2: MIM PAM Components

In this module the user experience and underlying technology in MIM PAM is introduced and examined. We look at each of the components in a properly managed PAM infrastructure; first from the view of a privileged user discussing how working in a PAM environment will change their working practices, then as the implementer identifying which vulnerabilities should be in-scope during the early stages of a PAM project and which might be added soon after.

Module 3: Configuring and Operating PAM

In this module, technical configuration of PAM, and important operational tasks are examined. We discover how to configure and operate PAM in an on-premises environment. We identify the issues in a hybrid on-premises/on-cloud environment and show how to manage similar security measures that are included in PAM by using the Privileged Identity Management (PIM) functionality of Azure AD.

I have just finished the reading and labs. This is a heavy but most rewarding course for me, lots of new acronyms to learn!  The course material is extremely well worked and instructive. Thanks for that.
Note: See our handy acronyms list!

 

5
Henrik P, Windows Infrastructure Architect, Denmark
MIM Foundation course - online, self-paced, 2019

Excellent content given the broad subject matter, delivered with expertise and humour.

5
Gary S, Senior Support Analyst, UK
PAM course - private training in the classroom, 2019

The instructor, Paul, was not only extremely knowledgeable, but very entertaining as well. Paul has extensive experience working with PAM/MIM in the field, and by sharing his own experiences with the product the course was tremendously enriched.

I thoroughly enjoyed the class and would wholeheartedly recommend it to any one looking to understand how to implement PAM in MIM.

5
Bryant G, IT Consultant, Canada
PAM course - live via Skype, 2019

Read more reviews