You are on page 1of 2

BeyondTrust PowerBroker for Unix & Linux Foundations Training

Course Description
The PowerBroker for Unix & Linux Foundations Course Outline
Training is designed for the IT security Introduction
professional tasked with installation,  Product Overview
administering, monitoring and reporting on  The classroom lab environment
PowerBroker for Unix & Linux.
Students learn how to install the products Architecture and installation
components, identify and edit configuration  Understand the key components of the
files, create policy for privilege delegation, PowerBroker for Unix and Linux solution
install the components needed for I/O log
 Install all components on a Linux host
review, and use the Analytics and Reporting
 Lab Exercise: Install all components
from within BeyondInsight.
Configuring basic policy
Prerequisites  Identify the key configuration files
There are no prerequisites for this course, but  Create and verify a new policy
the student should have hands on experience of  Lab Exercise: Configuration and Policy
general networking environments and
operating systems. Privilege Delegation
 Policy precedence and order of processing
 Privilege delegation use cases
Who Should Attend  Lab Exercise: Privilege Delegation
This course is for network managers, system
administrators, security administrators, systems Auditing and Logging
professionals, and consultants who are charged  Understand the auditing and logging
with the configuration, and day-to-day capabilities
management of PowerBroker for Unix & Linux  Review event logs
in a variety of network environments, and who  Use the replay utility to investigate I/O log
are responsible for administration of this activity
product in the enterprise environment.  Lab Exercise: Auditing and Logging

BeyondInsight Integration
Delivery Method  Configure BeyondInsight and PowerBroker
This course is available in the following delivery for Unix & Linux integration
methods:  Configure Solr for I/O log indexing and
 Web-based training (WBT) – Self-paced search
 Instructor-led training (ILT) – 2 days  Review PowerBroker for Unix & Linux audit
 Virtual Instructor-led training (VILT) – 15 data from BeyondInsight
hours over 3 days.  Lab Exercise: BeyondInsight Integration

PowerBroker for Unix & Linux and Sudo


 Configure PowerBroker for Sudo
 Lab Exercise: Configuring PBSudo

© 2016 BeyondTrust Corporation. All rights reserved. BeyondTrust, BeyondInsight and PowerBroker are trademarks or
registered trademarks of BeyondTrust in the United States and other countries. Microsoft, Windows, and other marks are the
trademarks of their respective owners
Analytics and Reporting
 Understand how to use the Analytics and
Reporting within BeyondInsight coupled
with PowerBroker for Unix & Linux data
 Lab Exercise: Analyzing PowerBroker for
Unix & Linux data with Analytics and
Reporting

Policy structure
 Create roles
 Set users, groups, hosts
 Set logging commands and limits
 Allow deny

Policy use cases


 Examine common uses cases
 Lab Exercise: Build common policies

Advanced Control and Audit


 How Advanced Control and Audit (ACA)
works
 Building an ACA policy
 ACA policy use cases
 Lab Exercise: Implementing ACA policy

Authentication
 Additional authentication methods
 Lab exercise: Implementing external
authentication with RADIUS

Failover
 High availability features
 High availability architecture
 Configuring failover
 Lab Exercise: Failover implantation for
multiple systems

Product integrations
 Using Password Safe with PowerBroker for
Unix & Linux for privilege delegation
 Authentication with PBIS
 Lab Exercise: Handing off an SSH session to
PBUL

© 2016 BeyondTrust Corporation. All rights reserved. BeyondTrust, BeyondInsight and PowerBroker are trademarks or
registered trademarks of BeyondTrust in the United States and other countries. Microsoft, Windows, and other marks are the
trademarks of their respective owners

You might also like