Training & Workshops

Expert Training
We empower your teams with hands-on knowledge
- IAM & PAM Fundamentals and Advanced Technical Workshops
- Certification tracks: SailPoint, CyberArk, Okta, Entra
- Lab-based virtual training
- Private bootcamps and webinars

IAM, IGA & PAM Training and Workshops
- Cyber Integer offers specialized training and hands-on workshops designed to upskill teams, accelerate platform adoption, and empower security operations with deep identity expertise.
Our Training Delivery Formats
- Virtual instructor-led sessions (interactive and live)
- Onsite classroom training for corporate teams
- Hands-on workshops and labs in sandbox environments
- Custom curriculum for advanced technical teams
Programs
Available Training Programs
Identity Governance (IGA) Training
- SailPoint IdentityNow / IdentityIQ: administration, implementation, and governance policies
-
Microsoft Entra ID Governance: lifecycle, access packages,
reviews, compliance -
One Identity Manager: advanced role models, policies,
workflows, and connectors
Privileged Access Management (PAM) Training
- CyberArk Core PAM: Vault, PSM, CPM, connector configuration, DR setup
- CyberArk Cloud (Secure Cloud Access, Secure Hub): SaaS deployment and integration
- BeyondTrust Password Safe and PRA: credential management, session policy, access rules
- Delinea Secret Server: vaulting, discovery, and automation
Access Management & CIAM Training
- Microsoft Entra External ID: B2B/B2C scenarios and branding
- Okta Workforce Identity and CIAM: integration, workflows, lifecycle policies
- Auth0 Developer Training: authentication flows, social login, JWT tokens, extensibility
PKI & Machine Identity Workshops
- Enterprise PKI architecture using DigiCert ONE, Microsoft ADCS, and Venafi
- Certificate lifecycle automation and governance
- Key management integration with HSM, Azure Key Vault, AWS KMS, and Vault
Why Choose
Who Should Attend?
- IAM Architects and Security Engineers
- Governance & Compliance Teams
- System Administrators and Application Owners
- DevOps and Cloud Security Engineers
Why Choose Cyber Integer for Training?
- Delivered by certified instructors and real-world IAM consultants
- Updated with latest product capabilities and best practices
- Real-world case studies and lab simulations
- Options for foundational, intermediate, and expert levels
Contact
Train. Transform. Secure.
-
Empower your teams with practical IAM expertise. Our training engagements are designed to maximize adoption, reduce implementation
errors, and align identity strategy with enterprise goals.
Contact us to schedule
A tailored IAM/PAM/PKI training session or workshop.