Cyber oriented engineering

lecture

In this session by Salo Shp, SRE Expert, We’ll go through 2 steps:

  • In the first part we will introduce the cyber threat map, review up-to-date tools, methodolgies and best-practices used by hackers, and learn how to apply them to secure our systems.

  • In the second part we will have a hands-on session. we will implement passwordless tokenized automated environments, with Hashicorp Vault, openLDAP, Kerberos and Jumphosts, using publicly available Ansible-based deployment code you can easily tweak for your use-case.

Thank you for your interest!

We will contact you as soon as possible.

Order this Training

Oops, something went wrong
Please try again or contact us by email at info@tikalk.com
Call us    +972 (3) 6488618
Thank you for your interest!

We will contact you as soon as possible.

Let's talk

Oops, something went wrong
Please try again or contact us by email at info@tikalk.com