Navigate your cloud native world with training that matures your DevOps practices

Learn how to put the latest open source technology into practice with hands-on training, delivered by industry experts, aligned to your desired business outcomes

cloud-native-training-and-consulting-compass.webp
KTP-logo.svg
KCSP-logo.svg
cncf-member-silver.svg
lf-atp-logo.svg
apache-bronze-sponsor-logo.svg
devops-institute-partner-logo-2021-150.png
scrumorg-ptn-logo-sq-150.webp
certnexus-silver-atp-logo-150.webp

Cryptography in Cloud Native Systems

3 Days

Available On-Site

Available Virtually

Open Enrollments Available


Cryptography in Cloud Native Systems is an in-depth three day hands-on course introduces developers, security professionals and other technology staff to the principles and practices driving modern cryptography.

Upon completion, attendees will have the knowledge and skills necessary to create and analyze best practice driven cryptographic systems that are robust, efficient and secure.

Delivery

Cryptography in Cloud Native Systems training is available for Instructor-Led (ILT) in-person/onsite training or Virtual Instructor-Led training (VILT) delivery; Open Enrollment options may be available.

Who Should Attend

Developers, InfoSec and CyberSec Professionals, IT and QA Staff, Architects, and Technical Managers may all benefit from the understanding of Cryptography, and its application in cloud native systems, offered by this course.

What Attendees will learn

Day one begins with a cryptography overview and coverage of both block and stream ciphers. Block cipher modes for streaming systems are covered along with schemes for encryption at rest, both on-prem and in the cloud.

Day two ties in hashing and signing technologies along with keys and key exchange. On the practical side, day two introduces attendees to certificates, PKI, TLS, IPSEC, WPA2 and various MAC and digital signature schemes used to authenticate binaries and containers. Each module in the course includes a hands-on lab, giving attendees a chance to work with common tools and technologies, providing practical insight to accompany the theory.

Day three introduces various key management schemes and tools such as Hashi Corp Vault and common cloud native platform solutions. The final sections cover authentication and encryption platforms such as Kerberos, OAUTH, SAML OpenID Connect and JWT.

Prerequisites

A general technology background is desirables for participants to excel in this course. Each attendee must have a laptop with internet access.


Contact us to request more information about enrolling in the Cryptography in Cloud Native Systems course or to inquire about booking a custom in-house course for your team.

The RX-M Approach

Bring a neutral perspective

We bring a market neutral perspective to every engagement, taking no stake in any of the competing cloud native platforms, components or solutions so we can offer unbiased insights to our clients

Practice what we teach

We are a multi-cloud company consisting of prominent open source contributors with large-scale software engineering experience, actively contributing to the evolution of next-gen software architectures, application management, and platforms

Be solution focused

RX-M has the unique ability to deliver purpose-built, solution-based training in the form of custom curriculum that aligns with each of our client's specific desired outcomes so your team has the skills needed to accelerate your business

Our team has been trusted to work alongside some of the world's leading companies

grey-client-logos-16-mar-2020.svg