Navigate your cloud native world with training that matures your DevOps practices
Learn how to put the latest open source technology into practice with hands-on training, delivered by industry experts, aligned to your desired business outcomes




Cryptography in Cloud Native Systems
Cryptography in Cloud Native Systems is an in-depth three day hands-on course introduces developers, security professionals and other technology staff to the principles and practices driving modern cryptography. Upon completion, attendees will have the knowledge and skills necessary to create and analyze best practice driven
cryptographic systems that are robust, efficient and secure. Cryptography in Cloud Native Systems training is available for Instructor-Led (ILT) in-person/onsite training or Virtual Instructor-Led training (VILT) delivery; Open Enrollment options may be available. Developers, InfoSec and CyberSec Professionals, IT and QA Staff, Architects, and Technical Managers may all benefit from the understanding of Cryptography, and its application in cloud native systems, offered by this course. Day one begins with a cryptography overview and coverage of both block and stream ciphers. Block cipher modes for streaming systems are covered along with schemes for encryption at rest, both on-prem and in the cloud. Day two ties in hashing and signing technologies along with keys and key exchange. On the practical side, day two introduces attendees to certificates, PKI, TLS, IPSEC, WPA2 and various MAC and digital signature schemes used to authenticate binaries and containers. Each module in the course includes a hands-on lab, giving attendees a chance to work with common tools and technologies, providing practical insight to accompany the theory. Day three introduces various key management schemes and tools such as Hashi Corp Vault and common cloud native platform solutions. The final sections cover authentication and encryption platforms such as Kerberos, OAUTH, SAML OpenID Connect and JWT. A general technology background is desirables for participants to excel in this course. Each attendee must have a laptop with internet access.
Delivery
Who Should Attend
What Attendees will learn
Prerequisites
Contact us to request more information about enrolling in the Cryptography in Cloud Native Systems course or to inquire about booking a custom in-house course for your team.
The RX-M Approach
Bring a neutral perspective
We bring a market neutral perspective to every engagement, taking no stake in any of the competing cloud native platforms, components or solutions so we can offer unbiased insights to our clients
Practice what we teach
We are a multi-cloud company consisting of prominent open source contributors with large-scale software engineering experience, actively contributing to the evolution of next-gen software architectures, application management, and platforms
Be solution focused
RX-M has the unique ability to deliver purpose-built, solution-based training in the form of custom curriculum that aligns with each of our client's specific desired outcomes so your team has the skills needed to accelerate your business