Privileged Access Management

preview_player
Показать описание
// Membership //

// Courses //

// Books //

// Social Links //

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Рекомендации по теме
Комментарии
Автор

Remember to subscribe to the channel so that you can be kept abreast of the latest cybersecurity tutorials.

LoiLiangYang
Автор

Thanks, Great overview. I'm starting on a new customer with Oneidentity PAM. I've hearc cyberark is mostly used though? thanks again brother

EllencyOfficial
Автор

Wow, this is what I was looking for, thank you sir for your good and excellent work. It is very helpful for me and for my company

japandeliciousfood
Автор

Great presentation Loi! It was easy to understand and at the end of the video, i gained very valuable knowledge on what an PAM does for an organization. Thank you for sharing this knowledge.

rsistor
Автор

This was the best PAM presentation thank you very much for the information. Regards

gustavoadolfocardenasjorda
Автор

Great presentation! Thank you very much for sharing the information. It will help me integrate a good PAM in my company.

MinhNguyen-uvbi
Автор

Fantastic presentation could you please help me I need to learn cyberark top to bottom please help .

balajimunikrishnan
Автор

what are the tools or systems available to implement PAM

benardkibetrotich
Автор

Thank you Loi for the video. I am implementing PAM solution in my organisation. I understand for servers, switches it is a must for privileged users. However for applications is it really required? Considering app admin has very limited access compared to standard user. An app admin can add/delete the user and may be modify few parameters. Also application has in-built control which means an any activity performed by an admin is logged (not always but most of the times). A standard user for an application has much more power (approve applications, process money transfer). Considering the scope of PAM solution in my organisation is privileged user only (admin users). Do applications need to be on-boarded to PAM?

AmanGargi
Автор

thanks for sharing this information.I'm new in Linux audit security. My question is this, is there a tool or specific process on how I can easily audit the access management in Linux which has like 200+ servers? thanks in advance

vaneza
Автор

Can you do a comparison of PAM software vendors? Thanks!

stodo
Автор

Great presentation. We seriously need an example of how to set up PAM in our infrasctructure (linux or windows). THANK YOU

nukebase
Автор

Please start a series malware packet analysis through network security tool.

abhaypratap
Автор

Thanks for best explanation, anyway do you have ppt?

topkhmersongremix
Автор

i have academic PAM project can you help me to give me some tuto to follow this !

kader
Автор

Greate Presentation. Thank you. Could you please give as what a leader PAM product or company. So we can check specifications and prices.

hasanalhuraibi
Автор

Is it possible for you to re-record the audio with the proper pronunciation of key words so that it is more understandable?

hoffmania
Автор

Great presentation! Thank you very much for sharing the information. It will help me integrate a good PAM in my company.

mrmgabyte