Free Online Training, Workshops & Masterclasses
We’re happy to present free online training, workshops, and masterclasses to improve your knowledge.
If you can’t make it to a particular session, go ahead and register anyway as every session is recorded and you can watch at a time that’s convenient for you.
Three AD Tasks You Should Leave To Your Users
June 19, 2025 02PM AEST | 02PM GST | 3:30PM IST
Password resets and account unlocks constitute almost 50% of IT support requests. When a single password reset call can cost a business $70, the expenses quickly add up.
Save invaluable time and money by giving your users the power to perform their own password resets, account unlocks, and directory updates. In this webinar, our product expert Sharada Murthy will demonstrate three key AD tasks you should leave to your users to reduce the load on IT support and increase overall productivity.
Getting started with PAM360: Privileged account and session management
Jun 19 2pm AEST | 11am GMT | 10am PDT
In the first episode of the fourth season of our Masterclass series, we will extensively cover how to discover and onboard all your privileged users and resources in PAM360. We will discuss how you can manage granular access to resources based on user roles and privileges. Additionally, we will delve into the password rotation capabilities of the product, the basics of privileged session management, and the auditing controls within the PAM platform.
Here is a glimpse of the episode’s key highlights:
- Discovering, onboarding, and managing resources by their type, function, or location and performing bulk actions with one click
- Securely sharing credentials across accounts, resources, and groups based on user roles
- Resetting privileged passwords using agent-based or agentless methods and triggering automated post-reset actions
- Launching one-click access to remote systems and securely connecting to web applications behind firewalls
- Recording and monitoring privileged sessions, enabling bidirectional file transfers, providing app-only access, and managing third-party access permissions
7 GPO misconfigurations to rectify under 30 mins
June 24, 2025 02PM AEST | 02PM GST | 3:30PM IST
Group Policy Objects (GPOs) regulate security and access within an AD environment. They are extremely powerful and equally complicated. The sheer number of GPOs, the way they coexist, and their unpredictable order of precedence requires administrators to have high levels of mastery. An uninformed change to a GPO can affect the way users interact with your network permanently. It’s crucial to take utmost care while configuring GPOs. Of course, there is always the possibility of misconfiguring a setting or two in the grand scheme of things.
In this webinar, we have put together 7 GPO misconfigurations that you can rectify in under 30 mins to boost the security of your organization.
4 self-service best practices to supercharge your IT security
June 26, 2025 02PM AEST | 02PM GST | 3:30PM IST
If your IT department spends much of their working hours on help desk tickets, then giving your employees a self-service portal is one of the best things you can do to boost your organization’s productivity. With a self-service portal, your IT department is freed up to focus on more pressing concerns and employees will spend less time waiting for their account to be unlocked or password to be reset.
The GenAI-powered analytics roadmap for ITOps excellence
June 26, 2025 2PM AEST | 10AM GMT | 10am PST
IT is no longer a back-end support function; it’s a core driver of business value. But with that elevated status comes increased scrutiny. CIOs are under constant pressure to prove IT’s value and accelerate outcomes that align with business goals, all while navigating legacy systems and complex infrastructures. To meet these demands, IT leaders need a smarter, data-driven approach to ITOps.
Enter AI-powered advanced analytics.
GenAI and cutting-edge AI/ML capabilities can empower IT teams to spot hidden gaps, predict future needs, and drive strategic impact across the board.
Maximizing Active Directory and Microsoft 365 security and compliance with automated access reviews
June 27, 2025 02PM AEST | 02PM GST | 3:30PM IST
Maximizing Active Directory and Microsoft 365 security and compliance with automated access reviews Gartner’s The Future of Compliance 2030 highlights a staggering prediction: by 2025, 80% of organizations worldwide will face penalties for non-compliance, with fines averaging $1.5 million per incident. These statistics underscore the urgent need for robust data governance and compliance measures.
Join us in this webinar to explore one of the most powerful tools for achieving compliance and enhancing security: Access Certification Campaigns. By systematically reviewing and certifying user access rights in Active Directory and Microsoft 365, organizations can fortify their security posture and streamline compliance processes, mitigating risks of costly penalties and reputational damage.
The SIEM basics: An introduction and how to get log collection right
June 30, 2025 02PM AEST | 02PM GST | 3:30PM IST
Gain a comprehensive understanding of SIEM (Security Information and Event Management) basics, empowering you to enhance your organization’s cybersecurity posture.
Learn crucial insights on optimizing log collection strategies, ensuring accurate and efficient data for effective threat detection and response.
Acquire practical knowledge from industry experts to implement best practices and avoid common pitfalls in SIEM deployment.