YoVDO

Secret Management with Hashicorp's Vault

Offered By: GOTO Conferences via YouTube

Tags

GOTO Conferences Courses LDAP Courses Database Security Courses Auditing Courses AWS Security Courses Secret Management Courses SSH Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore secret management with HashiCorp's Vault in this 43-minute conference talk from GOTO Berlin 2018. Gain insights into Vault's concepts, features, and practical applications for securing, storing, and controlling access to sensitive information. Learn about dynamic secrets, various secret backends including databases, AWS, and SSH, as well as authentication methods like LDAP, Okta, and Kubernetes. Discover how Vault handles leasing, key revocation, key rolling, and auditing. Follow along with demonstrations on leveraging Vault's extensive feature set and understand its internal workings, including audit logs and storage. Get started with Vault through an interactive tutorial and explore integration options for your projects.

Syllabus

Intro
Why focus on Vault
Other solutions
Secret Management: current situation
Question
Why am I talking about secret management
Typical project: Secret Management
Vault-executive summary
Vault secret backends-dynamic secrets
Vault secret backends - Databases
Vault secret backends - AWS
Vault secret backends - SSH
Vault dynamic secret backends - ssh Signed SSH Certificates
Vault dynamic secret backends - Transit
Vault secret backends-Transit
token auth
Vault auth backends - external identity providers
Vault auth backends - LDAP /Radius / Okta auth
Github auth
Vault auth backends-Kubernetes auth
Vault auth backends - AWS auth
Vault internals - Audit log
Vault internals - storage
Vault usage-integration
Vault-getting started - interactive tutorial


Taught by

GOTO Conferences

Related Courses

Spring Framework: Authenticating Users with Spring Security
Pluralsight
Learn DevOps: On-Prem or Cloud Agnostic Kubernetes
Udemy
Spring Security Basics
YouTube
Splunk Enterprise Administration: Managing Users and Authentication
Pluralsight
Ethical Hacking: Enumeration
Pluralsight