Let us help you find the training program you are looking for.

If you can't find what you are looking for, contact us, we'll help you find it. We have over 800 training programs to choose from.

Vault and Consul – Security Platforms

  • Course Code: SEC 1001
  • Course Dates: Contact us to schedule.
  • Course Category: Security & Cybersecurity Duration: 3 Days Audience: Developers, Architects

•HashiCorp Vault is a secrets management platform providing a secure enclave for static and dynamic secrets.
•HashiCorp Consul solves the challenges of service discovery, configuration management, and network segmentation in distributed applications.
•In this course you will learn the basics of using Vault, including managing secrets, configuring policies, and reviewing audit logs. You will also learn how to connect dynamic applications using Consul service discovery and service mesh.
•Comfortable with any programming language
•Comfortable in Linux environment (be able to navigate Linux command line, run commands)
Vault architecture
•Vault Overview
•Secret Engines: Static Secrets
•Secret Engines: Cubbyhole Secret Engine
•Secret Engines: Dynamic Secrets
•Encryption as a Service – Transit Secrets Engine
•Authentication
•Application Integration
Vault configuration
•Vault Installation
•Auto-Unseal
•Vault Cluster Deployment
•Vault Operations
•Vault Policies
•Secure Introduction
Vault scalability
•Vault Identities: Entities and Groups
•Namespaces
•Granular Access Control
•Scaling for Performance
•Codify Management of Vault Clusters
•Production Topologies
•Monitoring Vault
Consul
Microservices and Consul
•An introduction to monolithic vs service-oriented architectures
•Service discovery in a monolith
•Service discovery challenges in a distributed system and Consul’s solution
•Configuration management in a monolith
•Configuration challenges in a distributed system and Consul’s solution
•Network segmentation in a monolith
•Network segmentation challenges in a distributed system and Consul’s solutions
•The definition of “service mesh”
Consul hands-on
•Learn about the problems that Consul solves.
•Explore Consul’s architecture and interfaces (HTTP API, DNS interface, and web UI).
•Implement service discovery and health checking.
•Connect services into a service mesh to encrypt and control network traffic.
•Manipulate values in Consul’s key-value store and watch them for updates.
•Render a configuration file from key-value data using Consul Template.
•Install a local Consul agent that you can use to continue experimenting with after the course.
•Explore additional online learning resources.

Appendix – Background
Problem
•Security of software systems is becoming more and more important and visible in the public eye. Meanwhile, there is a basic imbalance between the attackers (hackers) and defenders (software developers). That is, hackers get immediate reward for their breach they effect and the damage the cause. By contracts, defenders get the blame when they are hacked and no mention when they are not.
•Our system addresses this and changes the balance, ultimately resulting in more secure software systems.
Solution
•(Pat. Pend.) IMPACT
1.Breaking the developers into two teams: blue (defenders) and red (attackers)
2.Recording the results of the attacker’s actions
3.Recording the successes of the defenders in stopping the attackers and their failures
4.Periodically update the scoreboard of the defenders thus proving positive reinforcement for their actions
5.The IMPACT system records the above data as logs. It is built on logging frameworks and well-known open source tools for log generation. It uses NoSQL databases to store the log data and Big Data analytics tools such as Spark generate the scoreboards.

View All Courses

    Course Inquiry

    Fill in the details below and we will get back to you as quickly as we can.

    Interested in any of these related courses?