Loading...
Please wait a moment
Founded by passionate advocates of learning and innovation, Learni set out to make professional training accessible to everyone, everywhere in the world. Our team works in the largest cities such as Paris, Lyon, Marseille, and internationally, to support talents and organizations in their skills development.
10 spots per session maximum — 7 already taken
Which format do you prefer?
30 free minutes with a training advisor — no commitment.
Loading available slots...
Professional Training training in Memphis in October 2026 with Learni. Certified, expert trainers, eligible for employer funding. Free quote.
Explore the projected return on investment from no-code training programs for businesses by March 2026, including cost savings, productivity gains, and real-world case studies.
Discover how design thinking training programs in March 2026 will equip innovation teams with cutting-edge skills for problem-solving, collaboration, and breakthrough creativity in a rapidly evolving business landscape.
Artificial Intelligence training in Cardiff in May 2026 with Learni. Certified, expert trainers, eligible for employer funding. Free quote.
Don't let this gap widen
Without mastery of secure secrets management, 81% of data breaches originate from compromised credentials, leaving sensitive keys, passwords, and tokens exposed in cloud environments.
Companies incur average costs of $4.45 million per breach, plus regulatory fines up to $50 million and months of operational downtime that erode market share.
DevOps teams and administrators face personal liability in post-incident audits, stalled career growth, and company-wide reputational damage—every month without robust practices multiplies these risks exponentially.
The Master Secure Secrets Management with Secret Manager: Secure Your Sensitive Information training is delivered in-person or remotely (blended-learning, e-learning, virtual classroom, remote in-person). At Learni, a Qualiopi-certified training organization, each program is designed to maximize skills acquisition, regardless of the training mode chosen.
The trainer alternates between demonstrative, interrogative, and active methods (through practical exercises and/or real-world scenarios). This pedagogical approach ensures concrete and directly applicable learning in the workplace.
To ensure the quality of the Master Secure Secrets Management with Secret Manager: Secure Your Sensitive Information training, Learni provides the following teaching resources:
For in-house training at a location external to Learni, the client ensures and commits to having all necessary teaching materials (IT equipment, internet connection...) for the proper conduct of the training action in accordance with the prerequisites indicated in the communicated training program.
The assessment of skills acquired during the Master Secure Secrets Management with Secret Manager: Secure Your Sensitive Information training is carried out through:
Learni is committed to the accessibility of its professional training programs. All our training programs are accessible to people with disabilities. Our teams are available to adapt teaching methods to your specific needs. Do not hesitate to contact us for any accommodation request.
Learni training programs are available for inter-company and intra-company settings, both in-person and remote. Registration is possible up to 48 business hours before the start of training. Our programs are eligible for OPCO, Pôle emploi, and FNE-Formation funding. Contact us to discuss your training project and funding possibilities.
Risks associated with secrets exposure: definitions, realistic attack scenarios. Why and how to protect access information (API keys, passwords, tokens...). Overview of secrets management in the cloud and on-premises. Introduction to Secret Manager (generic concept and overview of GCP, AWS, Azure offerings).
Setting up a project with Secret Manager (Google Cloud, AWS Secrets Manager, Azure Key Vault). Creating and managing the lifecycle of secrets: insertion, update, deletion, versioning. Best practices for naming and organization. Assigning access rights and identity management (IAM, granular permissions). Using CLI tools, SDKs, and graphical interfaces.
Automating secrets rotation and setting up alerts. Integration into CI/CD pipelines (GitHub Actions, GitLab CI, Jenkins). Use in containers (Docker, Kubernetes Secrets). Logging, access audits, and best practices for compliance (GDPR, ISO/IEC 27001). Concrete scenarios: secure sharing of secrets between multiple teams/projects.
Target audience
Developers, DevOps engineers, and system administrators who need to secure access to sensitive information in applications or cloud infrastructures.
Prerequisites
Basic knowledge of software development and cloud infrastructures.
Loading...
Please wait a moment





























