CyberArk Sentry Certification
Study Guide
Exam Objectives
The CyberArk Sentry Certification tests for the necessary expertise and technical skills to
deploy, install, and configure the CyberArk Privileged Access Management solution. It is
intended to certify an candidate’s competence to fill one of the following roles within a
Privileged Access Managment Program.
CyberArk Subject Matter Expert
The CyberArk SME designs controls which will be implemented with CyberArk and acts as a
liaison to user groups.
CyberArk Engineer
The CyberArk Engineer installs and manages non-production CyberArk environments, tests
new features and creates internal documentation.
Exam Content
The CyberArk Sentry Certification tests examanees ability to form the following tasks in eight
knowledge domains. Only functions of the Core PAM solution are included.
Deploy the Vault
Identify and describe the steps to migrate the server key to an HSM
Identify and describe the steps to complete a post-install hardening
Identify and describe the components and steps to complete a Vault installation
Describe how to prepare a Windows server for Vault installation
Describe how to register a primary vault in AWS using AMIs
Describe how to register a primary vault in Azure using the CyberArk image
Deploy the Password Vault Web Access (PVWA)
Identify and describe the steps to install the first and additional PVWAs
Evaluate and scope a customer environment todetermine the appropriate number
of PVWAs and their placement within the network
Describe the process to correctly harden a PVWA server
Describe various PVWA load balancing options
Prepare a Windows server for PVWA installation
Deploy the Central Policy Manager (CPM)
Identify and describe the steps to correctly harden a CPM server
Identify and describe the steps required to prepare a Windows server for CPM
installation
Identify and describe the steps to install the first and additional CPMs
Identify and describe the steps to rename a CPM
CyberArk Sentry Certification Study Guide 2
© Cyber-Ark Software Ltd. | cyberark.com
Evaluate and scope a customer environment to determine the number of CPMs
required and their placement within the network
Identify and describe Fault Tolerant Architecture components
Determine the quantities and locations of components needed to provide a fault
tolerant architecture to meet customer needs
Identify and describe distributed architecture components
Determine the quantities and locations of components needed to provide a
distributed architecture to meet customer needs
Deploy the Privileged Session Manager (PSM)
Identify and describe the steps to install the first and additional PSMs
Identify and describe preparation considerations for PSM deployment
Evaluate and scope a customer environment to calculate the amount of storage that
should be available to the PSMs for PSM recordings
Evaluate and scope a customer environment to calculate the amount of storage that
should be available to the Vault and PAReplicate for PSM recordings
Evaluate and scope a customer environment to determine the appropriate number
of PSMs and their placement withi the network
Identify and describe the steps to prepare a Windows server for PSM installation
Describe post-installation processes
Identify and describe the steps to complete an HTML5 Gateway installation
Identify and describe the steps to prepare a UNIX server for HTML5 Gateway
installation
Describe various PSM load-balancing options
Describe how to correctly harden a PSM server
Deploy the PSM For SSH
Identify and describe the steps to install the first and additional PSMs for SSH
Describe how to configure usrmng accounts
Describe the process to correctly harden a PSM for SSH server
Describe how to prepare a UNIX server for PSM for SSH installation
Configure Integrations
Configure authentication methods
Describe the steps required to combine a Vault and a PVWA authentication method
to create two-factor authentication
Describe how to configure PKI authentication
Describe how to configure RADIUS authentication
Describe how to configure SAML authentication
Identify and describe the components that work with each authentication method
Describe how to generate a custom connection component using the PGU
CyberArk Sentry Certification Study Guide 3
© Cyber-Ark Software Ltd. | cyberark.com
Perform integration tasks, including integrating with NTP, SMTP, SNMP, LDAP, and
Syslog/SIEM
Performance tune the solution
Identify and describe the steps to convert a platform from PMTerminal to TPC
Identify and describe how to correctly configure Interval and concurrent settings
Identify and describe how to correctly configure the Allowed Safes parameter
Evaluate and scope a customer environment to correctly size the servers to meet
customer needs
Install and deploy on a public cloud
Identify best practices agnostic to public cloud deployments
Identify and describe different cloud architectures
Describe key management considerations in a public cloud
Identify and describe various cost reduction strategies when deploying into a public
cloud
Study Resources
CyberArk provides a number of resources to prepare for the Sentry Exam
Instructor Led Courses
CyberArk Privileged Account Management Install and Configure
Free eLearning
HTML5 Based Remote Access
External Storage of PSM Recordings
Documentation
CyberArk Privileged Access Solution Installation Guide
CyberArk Sentry Certification Study Guide 4
© Cyber-Ark Software Ltd. | cyberark.com