In this session by Salo Shp, SRE Expert, We’ll go through 2 steps:
In the first part we will introduce the cyber threat map, review up-to-date tools, methodolgies and best-practices used by hackers, and learn how to apply them to secure our systems.
In the second part we will have a hands-on session. we will implement passwordless tokenized automated environments, with Hashicorp Vault, openLDAP, Kerberos and Jumphosts, using publicly available Ansible-based deployment code you can easily tweak for your use-case.
We will contact you as soon as possible.