BR +55 11 3069 3925 | USA +1 469 620 7643

Certification

Qualify and train the professionals who will work with senhasegura

Purpose

The purpose of the course is to enable and train professionals who will act on Deployment and Troubleshooting processes for the senhasegura solution.

Target audience

Professionals who will be involved in the installation, handling, operation, maintenance and troubleshooting of senhasegura.

Request a demo with an expert and understand  what your business needs

Benefits

Professionals who take the course and achieve the senhasegura Troubleshooting Deployment Certification will be able to:

Introduce privileged credential management concepts;

Introduce and present senhasegura features to clients;

Understand the solution offering plans;

Have a basic understanding of the solution use;

Understand the benefits and applicability of the solution in the client’s environment;

Introduce the solution’s structure, components and architecture;

Install and configure the hardware appliance;

Multiply the knowledgeable client base.

Install and configure the solution in the client’s virtual environment;

Configuration of backup services, high availability, contingency and disaster recovery services, as well as fixes and updates to the tool;

Offer Basic and Premium support for the solution;

Approach for troubleshooting and ticket resolution;

Monitor assisted operation of the solution;

Master Key Ceremony;

Implement basic solution configurations:

  • Device Management;
  • Credential Management;
  • Access Management;
  • Specific configurations for the client’s environment.

Methodology

The course methodology was developed with the best techniques and working practices.

In addition to presenting theoretical content, the course includes practical labs.

Participant Certification Criteria

Participants will be evaluated by a multiple choice test. To obtain the Certification, it is necessary to pass the online exam with a minimum score of 75%.

Requirements

The participant should bring a laptop (minimum 16GB of RAM), previously configured with virtualization software to configure senhasegura virtual machine.

Qualification required for participation: Senior IT Professional or Specialist

  • General knowledge of IT and credential management: Intermediate
  • Intermediate knowledge of Linux and Windows platform administration (Including AD and LDAP):
    – Knowledge of domain users;
    – Knowledge of Windows Policies and GPOs.
  • Intermediate knowledge of network architecture and TCP/IP protocol;
  • Intermediate knowledge of data replication methods;
  • Basic knowledge of databases
  • Basic notions of HTML and Javascript
  • Basic virtualization notions

    Course material

    Participants will be given presentation slides, manuals, quick guides for reference and the senhasegura virtual machine, which will be configured during the training.

      Duration

      The duration of the course is 40 hours.

        Program Content

        Part 1: Introduction

        1 – Introduction

        • What a password vault is;
        • What problems it solves;
        • How it works;
        • Benefits;
        • Operational Impacts;
        • Regulatory Compliance;
        • Possible Architectures;
        • Attention Points;
        • User Resistance Points;
        • Advantages for the Company;
        • Advantages for Users.

        2 – Basic Knowledge

        • User Management;
        • Identity Management;
        • Local User Management;
        • Password Change;
        • RDP;
        • SSH;
        • TELNET;
        • VNC;
        • HTTP PROXY;
        • Authentication, LDAP, AD;
        • Evidence Management.

         

        3 – Product Structure

        • Modules;
        • Architecture;
        • Product Components;
        • Models;
        • Hardware Specifications;
        • Capabilities.

         

        Part 2: Installation and Configuration

        1 – Installation Process

        • Preparation;
        • Planning and Deployment Strategy;
        • Attention Points;
        • Hardware Configurations;
        • Operating System– Configurations;
        • Application Configuration;
        • Device Configurations;
        • User and Authentication Configurations;
        • Policy Configuration;
        • Monitoring Configurations;
        • Backup Configurations;
        • Credential Importing;
        • Master Key Ceremony;
        • Environment Testing;
        • License Activation.

        2 – Rack Installation

        • Components;
        • Mounting Brackets;
        • Mounting on the Rack;
        • Powering Up;
        • Network Connections;
        • Lights and Indicators.

        3 – Basic Configurations

        • Network;
        • DNS;
        • Operating System;
        • Firmware;
        • Date and Time;
        • Monitoring;
        • Backup.

         

        4 – Shutdown and Restart

        • When to Use;
        • How to Shut Down Safely;
        • How to Restart Safely;
        • Recommendations.

        5 – Devices

        • Registration;
        • Batch Importing;
        • Configurations:
          -Model;
          -Manufacturer;
          -Types;
          -Connectivity.

        6 – Credentials

        • Registration;
        • Reports;
        • Password Custody;
        • Password Policies;
        • Configurations:
          -Power;
          -Type.

         

        7 – Executions

        • Password Change Operations;
        • Operation Logs;
        • Configurations:
          -Templates;
          -Profiles;
          -Parameters.

        8 – Access

        • Access Groups;
        • Access Request:
          -Approvals;
          -Requests.
        • Approval Workflow;
        • Reports;
        • Remote Access Sessions;
        • Command Audit;
        • Configurations:
          -Parameters;
          -Motives;
          -Web Session Parameters.

        9 – Protected Information

        • Registration;
        • Reports;
        • Configurations.

         

        10 – Reports

        • PCI;
        • Traceability;
        • Accesses;
        • Events.

        11 – Users

        • User Registration;
        • Permissions and Profiles;
        • Authentication;
        • Tokens;
        • Forms of Access.

        12 – Basic Services

        • Email Services;
        • Robots and Tasks;
        • Notifications.

         

        13 – Backup

        • Backup Types;
        • Purpose;
        • Configurations.

        14 – Master Key

        • What is it?;
        • What is it for?;
        • Configuration;
        • Recovery;
        • Renewal.

        15 – Patches and Updates

        • What are they?;
        • Update Frequency;
        • Update Procedure;
        • Packages;
        • Versioning.

         

        16 – High Availability/H.A.

        • What is it?;
        • Supported Architecture;
        • Failure Scenarios Supported by High Availability;
        • Architecture;
        • Replication;
        • Monitoring.

        17 – Contingency/Disaster Recovery

        • What is it?;
        • Supported architecture;
        • Failure scenarios supported by high availability;
        • Architecture;
        • Replication;
        • Monitoring.

        18 – Best practices

        • Configuration;
        • Monitoring;
        • Usability;
        • Access;
        • Responsibility Matrix.

         

        19 – Troubleshooting

        • Installation and Configuration Troubleshooting;
        • Common Problems Encountered in the senhasegura Operation:
          -Password Change Error;
          -Failure to Access Remote Session;
          -Loss of Access to Stored Password;
          -Authentication Provider -Configurations.
        • Ticket Resolution;
        • Client Customizations.

        Request a trial demonstration now and discover the benefits of senhasegura for your company

        Copy link
        Powered by Social Snap