hashicorp-certified-vault-operations-professional-2022-0

Introduction\ 0:00 Introduction 21:51 HashiCorp Documentation Review a working Vault server configuration given a scenario\ 32:47 Section Overview - Create a Working Vault Server Config 47:12 Enable and Configure Secrets Engines 59:38 KeyValue Secrets Engine 1:14:15 Working with the KeyValue Secrets Engine 1:30:20 Demo - KeyValue Secrets Engine Version 1 1:39:02 Demo - KeyValue Secrets Engine Version 2 2:02:54 Database Secrets Engine 2:26:43 Demo - Database Secrets Engine 2:43:11 Identity Secrets Engine 3:01:37 Demo - Identity Secrets Engine 3:11:03 Transit Secrets Engine 3:44:05 Demo - Transit Secrets Engine 3:58:48 PKI Secrets Engine 4:21:22 Demo - PKI Secrets Engine 4:29:32 Cubbyhole Secrets Engine 4:45:41 Demo - Cubbyhole Secrets Engine 4:57:26 Vault Security Hardening 5:24:31 Auto Unsealing Vault 5:51:57 Demo - Auto Unseal Vault 6:02:51 Implementing Integrated Storage 6:29:16 Demo - Integrated Storage 6:41:13 Demo - Integrated Storage Snapshots 6:48:12 Enable and Configure Auth Methods 7:04:30 AppRole Auth Method 7:28:41 Demo - AppRole Auth Method 7:34:23 Userpass Auth Method 7:44:48 Demo - Userpass Auth Method 7:49:26 Vault Tokens - Auth Method 8:01:06 Secure Vault Initialization 8:13:43 Demo - Practice secure Vault initialization 8:20:25 Regenerating a Root Token 8:32:01 Demo - Regenerating a Root Token 8:38:12 Rekey Vault and Rotate Encryption Keys 8:53:42 Demo - Rekey Vault and Rotate Encryption Keys a Vault Environment\ 9:01:41 Section Overview - Monitor a Vault Environment 9:03:34 Monitor and Understand Telemetry 9:12:24 Monitor and Understand Audit Logs 9:25:17 Demo - Audit Logs 9:30:32 Monitor and Understand Operational Logs 9:39:04 Demo - Vault Operational Logs the Vault Security Model\ 9:44:01 Section Overview - Employ the Vault Security Model 9:45:23 Secure Introduction of Vault Clients 10:00:15 Running Vault in Kubernetes Fault-Tolerant Vault Environments\ 10:06:39 Section Overview - Build Fault-Tolerant Vault Environments 10:07:53 Configure a Highly-Available Vault Cluster 10:26:32 Demo - Build an HA Cluster Manually 10:33:57 Demo - Build an HA Cluster Using Retry_Join 10:40:16 Demo - Build an HA Cluster Using Auto_Join 10:49:49 Enable and Configure Disaster Recovery (DR) Replication 11:25:10 Demo - Disaster Recovery (DR) Replication 11:39:03 Promote a Secondary Cluster 11:46:37 Demo - Promote a Secondary Cluster the Hardware Security Module (HSM) Integration\ 11:52:57 Section Overview - Understand the Hardware Security Module (HSM) Integration 11:55:06 Benefits of Auto Unsealing with HSM
Back to Top