This course provides an overview of technical IT basics in the Privileged Access Management (PAM) context. You will learn about the IT concepts, tools, and protocols needed to implement a PAM tool.
This course will provide a technical understanding of terminology and the working of modern enterprise environments. It will also help you learn about protocols and technologies for establishing communication and connectivity.
If you have already completed this module, go through the advanced course: Basics of IT and IT Infrastructure Part II to get hands-on experience.
What you will learn
- What is an Active Directory (AD)? And its importance?
- How does a web server work?
- Introduction to Cloud Computing
- The concepts of Networking
- What are diverse types of communication protocols?
- Application Programming Interface (API)
And many more IT concepts and their application.
Who is this course for?
This course will be helpful for individuals looking to acquire knowledge about IT and the applications of Privileged Access Management (PAM).
Requirements/Pre-requisites:
Just your interest and enthusiasm to learn and apply PAM, an important cybersecurity domain.
This course includes:
- 4 hours of on-demand video
- Two downloadable resources
- Interactive Learning mode
- Limited time access
- Credit points upon completion to unlock the next course