Training contributes to digital security
Our awareness and technology training sessions enhance your organization’s digital resilience and agility. Discover here how we can increase the knowledge of your employees.
Why training?
We value the development of your employees. We do this, on the one hand, with our interactive awareness training, tailored to your organization. On the other hand, we support your administrators with specific technology training courses, allowing the (new) solution to be used optimally. In our training courses, we always work according to a predefined format that is designed to suit the different learning styles of participants.
Awareness training
Our awareness training consists of several statements and case studies derived from your own organization, approached from a people, process and technology perspective. This creates a highly interactive program and a high level of participant involvement.
Target group
Managers and application owners.
Duration
One-day in-company training.
Description
Our awareness training empowers employees to actively contribute to the digital security of the organization. We prepare the training session by an alignment meeting and interviews with some of the participants. This allows us to respond well to the expectations and knowledge level of the target group. Based on these preparations, we develop organization-specific statements and cases that will be addressed during the training session.
Group size
A maximum of 25 participants with two trainers.
Investment
Upon request.
- Participants will have insight into the domain of Digital Identity.
- Participants acknowledge the importance of digital safety and understand that everyone will have to contribute to it.
- Participants know how they can contribute from their own positions.
- Participants will receive a 'toolkit' to educate employees on the importance of digital security.
CyberArk training
CyberArk Privilege Cloud (CPC) Administration.
This training course covers CyberArk Privilege Cloud (CPC), CyberArk's PAM SaaS solution. In this training your CyberArk administrators, or "Vault Admins," will gain hands-on experience in configuring and managing the Privilege Cloud solution.
Target Group
Administrators of the Privilege Cloud solution. We assume you have basic knowledge of networking and Windows administration.
Duration
A three-day training course in Dutch or English.
Description
This training provides participants with the knowledge and skills needed to manage, monitor and troubleshoot an existing CPC solution. The training includes presentations on CPC architecture, password management, session management and threat and risk detection, along with software concepts such as monitoring and troubleshooting.
Group size
A maximum of 8 persons per trainer. If there are more than 8 participants, two trainers will be present (in-company is possible).
Price
Upon Request
Dates
December 2, 3 and 4
Location
Grabowsky office in The Hague, Netherlands.
- Participants can describe system architectures and flows.
- Participants will know how to onboard accounts using Automatic Accounts Discovery and the password upload utility in the CyberArk solution.
- Participants can configure isolation and monitoring of PSM sessions.
- Participants will know how to change settings for main policies.
- Participants know how to perform general administrative tasks.
CyberArk training
PAM Administration, Defender (Level 2)
In this training course, the Core Privileged Access Security (PAS) module of the CyberArk suite is addressed. Your CyberArk administrators, or 'Vault Admins', gain practical experience in configuring and managing the Core PAS solution in this training course.
Target Group
Administrators of the PAM solution. We assume that you have a basic knowledge of networks and Windows administration.
Duration
A four-day training course in Dutch or English.
Description
This training course will provide participants with the knowledge and skills required to manage, secure and solve problems regarding an existing PAM implementation. The course includes presentations about PAM architecture, password management, session management and detection of threats and risks, in addition to software concepts, such as monitoring and troubleshooting.
Group size
A maximum of 8 persons per trainer. If there are more than 8 participants, two trainers will be present (in-company is possible).
Price
Upon Request
Dates
TBD
Certification
CyberArk Defender Level 2.
- Participants can describe system architectures and flows.
- Participants will know how to onboard accounts using Automatic Accounts Discovery and the password upload utility in the CyberArk solution.
- Participants can configure isolation and monitoring of PSM sessions.
- Participants will know how to change settings for main policies.
- Participants know how to perform general administrative tasks.
Our participants really appreciate that we provide the link between theory and practice. We offer insights into how (other) organizations use CyberArk and why you choose or don’t choose certain settings.
One Identity training
Identity Manager Foundation Training (#IM-IB)
This training course will give you an overview of what can be achieved with One Identity Manager. The focus of this course is on how the product works and what has been pre-configured. But also on what you need to do to deliver value to the organization and jointly get "in control". At the end of this course, you will have sufficient knowledge of the product and know how to achieve a successful implementation together.
Target group
Functional administrators and professionals responsible for role management, configuration of appropriate access and request, and approval processes.
Duration and materials
Five-day course in Dutch or English, using the official English training materials.
Description
This training course offers participants the knowledge and skills required to set up One Identity Manager and carry out daily management activities in an efficient manner. Using both practical examples and exercises, participants will learn how to gain complete control over identities with One Identity. This course focuses less on the technical components.
Group size
A maximum of 8 persons, with a minimum of 4 persons (in-company is possible).
Certificering
Participation in this training course will be recorded in a Certificate of Participation.
Dates
Please contact us for a suitable offer.
Investment
Upon request
- Participants will understand the global functions of a connector to a source and target system.
- Participants will understand the meaning of terms such as Business Roles, System Roles and Entitlements.
- Participants will know how to use the IT web portal.
- Participants will be able to configure roles.
- Participants will be able to carry out request/approval processes, segregation of duties (SoD) and various workflows.
- Participants will be able to carry out control processes.
One Identity training
Identity Manager Implementation Certification (#IM-IC)
This in-depth, technical training, which can be followed without the #IM-B course, focuses on synchronizing and adapting joiner, mover, leaver processes to your organization. At the end of this training course, participants will have technical knowledge of One Identity Manager and will be able to achieve a successful implementation.
Target group
Technical administrators and professionals responsible for connecting source and target systems and configuration work.
Duration and materials
Five-day course in Dutch or English, using the official English training materials.
Description
This in-depth, technical training offers participants more knowledge and skills, so they will be able to further configure One Identity Manager, including connecting and synchronizing applications and adjusting joiner, mover, leaver workflows. Using both practical examples and excercises, participants will learn how to gain complete control over identities. This training will tell you a lot about standard connectors, the synchronization module and the configuration of the technical components but will also focus on how your organization can be assisted and what is required to achieve this.
Group size
A maximum of 8 persons, with a minimum of 4 persons (in-company is possible).
Certification
Participation in this training course will be recorded in a Certificate of Participation.
This course will prepare you for the ‘Certified Identity Manager Implementation Professional’ exam.
Investment
Upon request.
- Participants will understand how applications can be connected to the system.
- Participants will gain insight into how scripts and other programming options can help the system perform optimally in their own organization.
- Participants will know how the security, authentication and permissions work that are part of the suite/package.
- Participants will be able to configure Business Roles, System Roles and Entitlements.
- Participants will be able to configure and carry out request/approval processes, segregation of duties (SoD) and various workflows.
- Participants will be able to create technical workflows.
- Participants will be able to create monitoring processes (attestations, reports, data quality overviews and risk models).
Would you like to know more about our training programs?
Feel free to contact Carmin
Besides training we offer
Business consultancy
A Digital Identity project does not start with the purchase of a tool, but with a smart plan. We will help you with strategy definition, finding the right technology and embedding it in the organization.Solution consultancy
The implementation of Digital Identity solutions can be complex. We use the most precise and transparent process possible and will help your organization to keep it simple and manageable.Support
For many organizations, it is difficult to have access to specialist knowledge. Strengthen your organization - with the knowledge of our experts - in the field of Digital Identity and related tooling.Managed Service
Ons managed serviceteam neemt de verantwoordelijkheid voor 24/7 beschikbaarheid van de Digital Identity oplossing van je over. Wij garanderen een snelle signalering en proactieve oplossing van incidenten.Do you want to boost your agility and resilience?
We would like to help you reach your goal by using the right Digital Identity strategy and suitable Identity & Access Management solutions for your employees, partners, suppliers and customers.