hashicorp-certified-vault-operations-professional-2022-0
Introduction\
0:00 Introduction
21:51 HashiCorp Documentation Review
a working Vault server configuration given a scenario\
32:47 Section Overview - Create a Working Vault Server Config
47:12 Enable and Configure Secrets Engines
59:38 KeyValue Secrets Engine
1:14:15 Working with the KeyValue Secrets Engine
1:30:20 Demo - KeyValue Secrets Engine Version 1
1:39:02 Demo - KeyValue Secrets Engine Version 2
2:02:54 Database Secrets Engine
2:26:43 Demo - Database Secrets Engine
2:43:11 Identity Secrets Engine
3:01:37 Demo - Identity Secrets Engine
3:11:03 Transit Secrets Engine
3:44:05 Demo - Transit Secrets Engine
3:58:48 PKI Secrets Engine
4:21:22 Demo - PKI Secrets Engine
4:29:32 Cubbyhole Secrets Engine
4:45:41 Demo - Cubbyhole Secrets Engine
4:57:26 Vault Security Hardening
5:24:31 Auto Unsealing Vault
5:51:57 Demo - Auto Unseal Vault
6:02:51 Implementing Integrated Storage
6:29:16 Demo - Integrated Storage
6:41:13 Demo - Integrated Storage Snapshots
6:48:12 Enable and Configure Auth Methods
7:04:30 AppRole Auth Method
7:28:41 Demo - AppRole Auth Method
7:34:23 Userpass Auth Method
7:44:48 Demo - Userpass Auth Method
7:49:26 Vault Tokens - Auth Method
8:01:06 Secure Vault Initialization
8:13:43 Demo - Practice secure Vault initialization
8:20:25 Regenerating a Root Token
8:32:01 Demo - Regenerating a Root Token
8:38:12 Rekey Vault and Rotate Encryption Keys
8:53:42 Demo - Rekey Vault and Rotate Encryption Keys
a Vault Environment\
9:01:41 Section Overview - Monitor a Vault Environment
9:03:34 Monitor and Understand Telemetry
9:12:24 Monitor and Understand Audit Logs
9:25:17 Demo - Audit Logs
9:30:32 Monitor and Understand Operational Logs
9:39:04 Demo - Vault Operational Logs
the Vault Security Model\
9:44:01 Section Overview - Employ the Vault Security Model
9:45:23 Secure Introduction of Vault Clients
10:00:15 Running Vault in Kubernetes
Fault-Tolerant Vault Environments\
10:06:39 Section Overview - Build Fault-Tolerant Vault Environments
10:07:53 Configure a Highly-Available Vault Cluster
10:26:32 Demo - Build an HA Cluster Manually
10:33:57 Demo - Build an HA Cluster Using Retry_Join
10:40:16 Demo - Build an HA Cluster Using Auto_Join
10:49:49 Enable and Configure Disaster Recovery (DR) Replication
11:25:10 Demo - Disaster Recovery (DR) Replication
11:39:03 Promote a Secondary Cluster
11:46:37 Demo - Promote a Secondary Cluster
the Hardware Security Module (HSM) Integration\
11:52:57 Section Overview - Understand the Hardware Security Module (HSM) Integration
11:55:06 Benefits of Auto Unsealing with HSM