Hashicorp Certified Vault Associate: Getting Started
This course will introduce the initial concepts and skills to work with Vault and prepare for the Associate certification.
What you'll learn
HashiCorp Vault is an open-source secrets management platform, providing a secure enclave for static and dynamic secrets. In this course, HashiCorp Certified Vault Associate: Getting Started, you’ll learn to work with HashiCorp Vault in a development setting. First, you’ll explore how to interact and authenticate to Vault. Next, you’ll discover how Vault uses policies and tokens. Finally, you’ll learn how to enable and configure secrets engines. When you’re finished with this course, you’ll have new skills and knowledge of HashiCorp Vault needed to prepare for the Associate level certification.
Table of contents
- Overview 1m
- Running Vault in Development Mode 1m
- Installing the Vault Binary 1m
- Development Mode Considerations 2m
- Launch Vault in Dev Mode 1m
- Demonstration Overview 1m
- Downloading the Vault Binary 2m
- Interacting with Vault 2m
- Starting Vault Server in Development Mode 5m
- Environment Variables in Vault 2m
- Using the Environment Variables 1m
- Vault UI Overview 1m
- Examining the Vault UI 2m
- Vault API Overview 1m
- Using the Vault API 3m
- Key Takeaways 2m
- Overview 1m
- Authentication Methods Overview 2m
- Selecting an Authentication Method 2m
- Userpass and AppRole Overview 2m
- Globomantics Scenarios 2m
- Configuring Authentication Methods 2m
- Auth Method Commands 2m
- Enabling the Userpass Method 3m
- Enabling the AppRole Method 3m
- Configuring the Userpass Method 3m
- Configuring the AppRole Method 2m
- Using an Auth Method 2m
- Using the Userpass Method 1m
- Using the AppRole Method 3m
- Using AppRole with the API 2m
- Disabling an Auth Method 1m
- Key Takeaways 1m
- Overview 1m
- Vault Policy Overview 2m
- Reviewing the Default Policy 1m
- Introducing Policy Syntax 1m
- Exploring Path Examples 3m
- Capabilities Overview 2m
- Exploring Capabilities Examples 2m
- Globomantics Scenarios 2m
- Policy Assignment Process 1m
- Working with Policy Commands 2m
- Creating a Policy with the CLI 4m
- Creating a Policy with the UI 3m
- Policy Assignment Commands 1m
- Assigning a Policy to a Token 2m
- Updating a Policy with the CLI 2m
- Assigning a Policy with an Auth Method 3m
- Key Takeaways 2m
- Overview 1m
- Vault Token Overview 1m
- Examining Root Tokens 2m
- Essential Token Properties 2m
- Understanding the Accessor 2m
- Working with Tokens 2m
- Creating Tokens with the CLI 5m
- Comparing Service and Batch Tokens 3m
- Batch Token Scenario 1m
- Creating a Batch Token 2m
- Examining Token Lifetime 2m
- Working with Token Lifetime 1m
- Assessing the Max Effective TTL 3m
- Exploring TTL with the CLI 4m
- Examining the Explicit Max TTL 1m
- Introducing the Periodic Token 3m
- Creating a Periodic Token with the CLI 2m
- Reviewing Token Hierarchy 2m
- Key Takeaways 2m
- Overview 1m
- Secrets Engine Overview 3m
- Examining the Identity and Cubbyhole Engines 3m
- Differentiating Static and Dynamic Secrets 2m
- Dynamic Secrets Scenario 1m
- Introducing the Key Value Engine 3m
- Key Value Engine Scenario 1m
- Introducing the Transit Engine 1m
- Transit Engine Scenario 1m
- Enabling Secrets Engines 3m
- Working with Secrets Engines Commands 2m
- Demonstrating Secrets Engines 1m
- Enabling a Secrets Engine with the CLI 4m
- Enabling a Secrets Engine with the UI 2m
- Configuring the Key Value Engine 2m
- Configuring the Consul Engine 5m
- Using Secrets Engines 1m
- Interacting with the Consul Engine 4m
- Interacting with the Key Value Engine 3m
- Using the Key Value Engine with the CLI 5m
- Using the Key Value Engine with the API 2m
- Using the Key Value Engine in the UI 2m
- Examining Response Wrapping 2m
- Using Response Wrapping 5m
- Key Takeaways 2m