If you can't find what you are looking for, contact us, we'll help you find it. We have over 800 training programs to choose from.
•HashiCorp Vault is a secrets management platform providing a secure enclave for static and dynamic secrets.
•HashiCorp Consul solves the challenges of service discovery, configuration management, and network segmentation in distributed applications.
•In this course you will learn the basics of using Vault, including managing secrets, configuring policies, and reviewing audit logs. You will also learn how to connect dynamic applications using Consul service discovery and service mesh.
•Comfortable with any programming language
•Comfortable in Linux environment (be able to navigate Linux command line, run commands)
•Secret Engines: Static Secrets
•Secret Engines: Cubbyhole Secret Engine
•Secret Engines: Dynamic Secrets
•Encryption as a Service – Transit Secrets Engine
•Vault Cluster Deployment
•Vault Identities: Entities and Groups
•Granular Access Control
•Scaling for Performance
•Codify Management of Vault Clusters
Microservices and Consul
•An introduction to monolithic vs service-oriented architectures
•Service discovery in a monolith
•Service discovery challenges in a distributed system and Consul’s solution
•Configuration management in a monolith
•Configuration challenges in a distributed system and Consul’s solution
•Network segmentation in a monolith
•Network segmentation challenges in a distributed system and Consul’s solutions
•The definition of “service mesh”
•Learn about the problems that Consul solves.
•Explore Consul’s architecture and interfaces (HTTP API, DNS interface, and web UI).
•Implement service discovery and health checking.
•Connect services into a service mesh to encrypt and control network traffic.
•Manipulate values in Consul’s key-value store and watch them for updates.
•Render a configuration file from key-value data using Consul Template.
•Install a local Consul agent that you can use to continue experimenting with after the course.
•Explore additional online learning resources.
Appendix – Background
•Security of software systems is becoming more and more important and visible in the public eye. Meanwhile, there is a basic imbalance between the attackers (hackers) and defenders (software developers). That is, hackers get immediate reward for their breach they effect and the damage the cause. By contracts, defenders get the blame when they are hacked and no mention when they are not.
•Our system addresses this and changes the balance, ultimately resulting in more secure software systems.
•(Pat. Pend.) IMPACT
1.Breaking the developers into two teams: blue (defenders) and red (attackers)
2.Recording the results of the attacker’s actions
3.Recording the successes of the defenders in stopping the attackers and their failures
4.Periodically update the scoreboard of the defenders thus proving positive reinforcement for their actions
5.The IMPACT system records the above data as logs. It is built on logging frameworks and well-known open source tools for log generation. It uses NoSQL databases to store the log data and Big Data analytics tools such as Spark generate the scoreboards.