Certification

Qualify and train the professionals who will work with senhasegura

Purpose

The purpose of the course is to enable and train professionals who will act on Deployment and Troubleshooting processes for the senhasegura solution.

Target audience

Professionals who will be involved in the installation, handling, operation, maintenance and troubleshooting of senhasegura.

Benefits

Professionals who take the course and achieve the senhasegura Troubleshooting Deployment Certification will be able to:

  • Introduce privileged credential management concepts;
  • Introduce and present senhasegura features to clients;
  • Understand the solution offering plans;
  • Introduce the solution’s structure, components and architecture;
  • Understand the benefits and applicability of the solution in the client’s environment;
  • Have a basic understanding of the solution use;
  • Install and configure the hardware appliance;
  • Install and configure the solution in the client’s virtual environment;
  • Implement basic solution configurations:
    • Device Management;
    • Credential Management;
    • Access Management;
    • Specific configurations for the client’s environment.
  • Configure backup, high availability, contingency and disaster recovery services, as well as fixes and updates to the tool;
  • Master Key Ceremony;
  • Approach for troubleshooting and ticket resolution;
  • Monitor assisted operation of the solution;
  • Offer Basic and Premium support for the solution;
  • Multiply knowledge for clients.

Methodology

The course methodology was developed with the best techniques and working practices.

Besides presenting theoretical content, the course includes practical labs.

Participant Certification Criteria

Participants will be evaluated by a multiple choice test. To obtain Certification, it is necessary to pass the online exam with a minimum score of 75%.

Requirements

The participant should bring a laptop (minimum 16GB of RAM), previously configured with virtualization software to configure senhasegura virtual machine.

Qualification required for participation: Senior IT Professional or Specialist

  • General knowledge of IT and credential management: Intermediate
  • Intermediate knowledge of Linux and Windows platform administration (Including AD and LDAP):
    • Knowledge of domain users;
    • Knowledge of Windows Policies and GPOs.
  • Intermediate knowledge of network architecture and TCP/IP protocol;
  • Intermediate knowledge of data replication methods;
  • Basic knowledge of databases
  • Basic notions of HTML and Javascript
  • Basic virtualization notions

Course material

Participants will be given presentation slides, manuals, quick guides for reference and the senhasegura virtual machine, which will be configured during the training.

Duration

The duration of the course is 40 hours.

Program Content

Part 1: Introduction

  1. Introduction
    • What a password vault is;
    • What problems it solves;
    • How it works;
    • Benefits;
    • Operational Impacts;
    • Regulatory Compliance;
    • Possible architectures;
    • Attention points;
    • User resistance points;
    • Advantages for the company;
    • Advantages for users.
  2. Basic Knowledge
    • User management;
    • Identity management;
    • Local User Management;
    • Password change;
    • RDP;
    • SSH;
    • TELNET;
    • VNC;
    • HTTP PROXY;
    • Authentication, LDAP, AD;
    • Evidence management.
  3. Product Structure
    • Modules;
    • Architecture;
    • Product Components;
    • Models;
    • Hardware specifications;
    • Capabilities.

Part 2: Installation and Configuration

  1. Installation Process
    • Preparation;
    • Planning and deployment strategy;
    • Attention points;
    • Hardware configurations;
    • Operating system configurations;
    • Application configuration;
    • Device configurations;
    • User and authentication configurations;
    • Policy Configuration;
    • Monitoring Configurations;
    • Backup Configurations;
    • Credential importing;
    • Master Key Ceremony;
    • Environment testing;
    • License Activation.
  2. Rack Installation
    • Components;
    • Mounting brackets;
    • Mounting on the Rack;
    • Powering up;
    • Network connections;
    • Lights and indicators.
  3. Basic Configurations
    • Network;
    • DNS;
    • Operating system;
    • Firmware;
    • Date and time;
    • Monitoring;
    • Backup.
  4. Shutdown and Restart
    • When to use;
    • How to shut down safely;
    • How to restart safely;
    • Recommendations.
  5. Devices
    • Registration;
    • Batch importing;
    • Configurations:
      • Model;
      • Manufacturer;
      • Types;
      • Connectivity.
  6. Credentials
    • Registration;
    • Reports;
    • Password custody;
    • Password policies;
    • Configurations:
      • Power;
      • Type.
  7. Executions
    • Password change operations;
    • Operation logs;
    • Configurations:
      • Templates;
      • Profiles;
      • Parameters.
  8. Access
    • Access groups;
    • Access request:
      • Approvals;
      • Requests.
    • Approval workflow;
    • Reports;
    • Remote access sessions;
    • Command audit;
    • Configurations:
      • Parameters;
      • Motives;
      • Web session parameters.
  9. Protected Information
    • Registration;
    • Reports;
    • Configurations.
  10. Reports
    • PCI;
    • Traceability;
    • Accesses;
    • Events.
  11. Users
    • User registration;
    • Permissions and profiles;
    • Authentication;
    • Tokens;
    • Forms of access.
  12. Basic Services
    • Email Services;
    • Robots and tasks;
    • Notifications.
  13. Backup
    • Backup types;
    • Purpose;
    • Configurations.
  14. Master Key
    • What is it?;
    • What is it for?;
    • Configuration;
    • Recovery;
    • Renewal.
  15. Patches and Updates
    • What are they?;
    • Update frequency;
    • Update procedure;
    • Packages;
    • Versioning.
  16. High Availability/H.A.
    • What is it?;
    • Supported architecture;
    • Failure scenarios supported by high availability;
    • Architecture;
    • Replication;
    • Monitoring.
  17. Contingency/Disaster Recovery
    • What is it?;
    • Supported architecture;
    • Failure scenarios supported by high availability;
    • Architecture;
    • Replication;
    • Monitoring.
  18. Best practices
    • Configuration;
    • Monitoring;
    • Usability;
    • Access;
    • Responsibility matrix.
  19. Troubleshooting
    • Installation and configuration troubleshooting;
    • Common problems encountered in the senhasegura operation:
      • Password change error;
      • Failure to access remote session;
      • Loss of access to stored password;
      • Authentication provider configurations.
    • Ticket resolution;
    • Client customizations.

Find out why senhasegura is the fastest growing PAM solution in Brazil

REQUEST DEMO