Let us help you find the training program you are looking for.

If you can't find what you are looking for, contact us, we'll help you find it. We have over 800 training programs to choose from.


Course Skill Level:


Course Duration:

3 day/s

  • Course Delivery Format:

    Live, instructor-led.

  • Course Category:

    Security & Cybersecurity

  • Course Code:


Who should attend & recommended skills:

Developers & architects with intermediate to advanced programming language skills and basic Linux environment experience

Who should attend & recommended skills

  • Developers, architects
  • Programming language (any): Intermediate-advanced (3+ years’ experience)
  • Linux environment: Basic + (at least one year) with ability to navigate Linux command line, run commands, etc.

About this course

HashiCorp Vault is a secrets management platform providing a secure enclave for static and dynamic secrets.
HashiCorp Consul solves the challenges of service discovery, configuration management, and network segmentation in distributed applications.
In this course you will learn the basics of using Vault, including managing secrets, configuring policies, and reviewing audit logs. You will also learn how to connect dynamic applications using Consul service discovery and service mesh.
Security of software systems is becoming more and more important and visible in the public eye. Meanwhile, there is a basic imbalance between the attackers (hackers) and defenders (software developers). That is, hackers get immediate reward for their breach they effect and the damage the cause. By contracts, defenders get the blame when they are hacked and no mention when they are not.
Our system addresses this and changes the balance, ultimately resulting in more secure software systems.
(Pat. Pend.) IMPACT
Breaking the developers into two teams: blue (defenders) and red (attackers)
Recording the results of the attackers actions
Recording the successes of the defenders in stopping the attackers and their failures
Periodically update the scoreboard of the defenders thus proving positive reinforcement for their actions
The IMPACT system records the above data as logs. It is built on logging frameworks and well-known open source tools for log generation. It uses NoSQL databases to store the log data and Big Data analytics tools such as Spark generate the scoreboards.

Skills acquired & topics covered

  • Vault architecture
  • Vault configuration
  • Vault scalability
  • Consul
  • Microservices and Consul
  • Consul hands-on
  • Appendix – Background

Course breakdown / modules

  • Vault Overview
  • Secret Engines: Static Secrets
  • Secret Engines: Cubbyhole Secret Engine
  • Secret Engines: Dynamic Secrets
  • Encryption as a Service – Transit Secrets Engine
  • Authentication
  • Application Integration

  • Vault Installation
  • Auto-Unseal
  • Vault Cluster Deployment
  • Vault Operations
  • Vault Policies
  • Secure Introduction

  • Vault Identities: Entities and Groups
  • Namespaces
  • Granular Access Control
  • Scaling for Performance
  • Codify Management of Vault Clusters
  • Production Topologies
  • Monitoring Vault

  • An introduction to monolithic vs service-oriented architectures
  • Service discovery in a monolith
  • Service discovery challenges in a distributed system and Consul’s solution
  • Configuration management in a monolith
  • Configuration challenges in a distributed system and Consul’s solution
  • Network segmentation in a monolith
  • Network segmentation challenges in a distributed system and Consul’s solutions
  • The definition of service mesh

  • Learn about the problems that Consul solves.
  • Explore Consul’s architecture and interfaces (HTTP API, DNS interface, and web UI).
  • Implement service discovery and health checking.
  • Connect services into a service mesh to encrypt and control network traffic.
  • Manipulate values in Consul’s key-value store and watch them for updates.
  • Render a configuration file from key-value data using Consul Template.
  • Install a local Consul agent that you can use to continue experimenting with after the course.- Explore additional online learning resources.