0% found this document useful (0 votes)
149 views2 pages

CyberArk Certification Exam Objectives

The document outlines certification objectives for the Defender and Sentry exams for CyberArk Privileged Account Security. For the Defender exam, the objectives cover describing system architecture and flows, managing passwords, onboarding accounts, configuring session isolation and monitoring, monitoring sessions and recorded sessions, using the Privileged Threat Analytics tool, establishing connections through a Privileged Session Manager, modifying master policy settings, producing reports, and performing administrative tasks. For the Sentry exam, the objectives are to install and configure CyberArk Privileged Account Security securely, describe the system architecture and workflows, secure and install components in distributed configurations, and integrate with external services including authentication mechanisms.

Uploaded by

Prajot Prasad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views2 pages

CyberArk Certification Exam Objectives

The document outlines certification objectives for the Defender and Sentry exams for CyberArk Privileged Account Security. For the Defender exam, the objectives cover describing system architecture and flows, managing passwords, onboarding accounts, configuring session isolation and monitoring, monitoring sessions and recorded sessions, using the Privileged Threat Analytics tool, establishing connections through a Privileged Session Manager, modifying master policy settings, producing reports, and performing administrative tasks. For the Sentry exam, the objectives are to install and configure CyberArk Privileged Account Security securely, describe the system architecture and workflows, secure and install components in distributed configurations, and integrate with external services including authentication mechanisms.

Uploaded by

Prajot Prasad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Certification Objectives

Defender Exam:-

1. Describe the system architecture and flows (Refer 02-PAS p.g no 3-10)

2. Successfully manage passwords (verification, change, and reconciliation)


(Refer 04.1-PAS p.g no 35-41)

3. On-board accounts using Automatic Accounts Discovery and the Password


Upload Utility (Refer 06-PAS Full doc)

4. Configure PSM session isolation and monitoring (Refer 07-PAS Full Doc)

5. Monitor sessions, view recorded sessions (Refer 07-PAS Full Doc)

6. Use the PTA to monitor privileged account activity in the network (Refer 08-
PAS Full Doc)

7. Describe how connections through a PSMP can be established (Refer 07-PAS


p.g no 57-63)

8. Modify Master Policy settings (Refer 04.1-PAS 07-19) & (Refer 04.2-PAS 15-27)

9. Produce reports on various system and user activities (Refer 09-PAS Full Doc)

10. Monitor the CyberArk implementation (Refer 10-PAS Doc)

11. Describe and configure the various logs that are available to troubleshoot
problems (Refer 10-PAS Full Doc)

12. Utilize the knowledge base and other available resources to resolve problems
(Refer 10-PAS Full Doc)

13. Perform common administrative tasks (Refer 11-PAS Full Doc)

Sentry Exam:-

1. Learn to install and configure the CyberArk Privileged Account Security solution
securely following Best Practices.
2. Be able to define and describe the CyberArk Privileged Account Security system
architecture, requirements, and workflow processes.

3. Understand how to secure and install Password Vault Web Access (PVWA) Central
Policy Manager (CPM) and Privileged Session Manager (PSM) in a distributed or
Load Balanced configuration.

4. Learn how to integrate with external services, e.g., LDAP/S, NTP, SMTP, SYSLOG.

5. Configure authentication mechanisms including multi-factor authentication using


CyberArk, RADIUS, LDAP/S, PKI, Windows.

You might also like