Loading...
Please wait a moment
Founded by passionate advocates of learning and innovation, Learni set out to make professional training accessible to everyone, everywhere in the world. Our team works in the largest cities such as Paris, Lyon, Marseille, and internationally, to support talents and organizations in their skills development.
10 spots per session maximum — 7 already taken
Which format do you prefer?
30 free minutes with a training advisor — no commitment.
Loading available slots...
Discover essential Slack training strategies to enhance team communication and boost productivity ahead of March 2026. Learn best practices, future trends, and implementation tips for remote and hybrid teams.
Discover the best sports management training options starting in March 2026, essential skills, trends, and preparation tips for aspiring managers entering the dynamic sports industry.
Professional Training training in Dallas in July 2026 with Learni. Certified, expert trainers, eligible for employer funding. Free quote.
Discover why customer journey mapping training is essential for marketing teams in March 2026. Learn step-by-step guides, tools, trends, and strategies to boost customer experience and revenue.
Don't let this gap widen
Without mastery of secure secrets management, 81% of data breaches originate from compromised credentials, leaving sensitive keys, passwords, and tokens exposed in cloud environments.
Companies incur average costs of $4.45 million per breach, plus regulatory fines up to $50 million and months of operational downtime that erode market share.
DevOps teams and administrators face personal liability in post-incident audits, stalled career growth, and company-wide reputational damage—every month without robust practices multiplies these risks exponentially.
The Master Secure Secrets Management with Secret Manager: Secure Your Sensitive Information training is delivered in-person or remotely (blended-learning, e-learning, virtual classroom, remote in-person). At Learni, a Qualiopi-certified training organization, each program is designed to maximize skills acquisition, regardless of the training mode chosen.
The trainer alternates between demonstrative, interrogative, and active methods (through practical exercises and/or real-world scenarios). This pedagogical approach ensures concrete and directly applicable learning in the workplace.
To ensure the quality of the Master Secure Secrets Management with Secret Manager: Secure Your Sensitive Information training, Learni provides the following teaching resources:
For in-house training at a location external to Learni, the client ensures and commits to having all necessary teaching materials (IT equipment, internet connection...) for the proper conduct of the training action in accordance with the prerequisites indicated in the communicated training program.
The assessment of skills acquired during the Master Secure Secrets Management with Secret Manager: Secure Your Sensitive Information training is carried out through:
Learni is committed to the accessibility of its professional training programs. All our training programs are accessible to people with disabilities. Our teams are available to adapt teaching methods to your specific needs. Do not hesitate to contact us for any accommodation request.
Learni training programs are available for inter-company and intra-company settings, both in-person and remote. Registration is possible up to 48 business hours before the start of training. Our programs are eligible for OPCO, Pôle emploi, and FNE-Formation funding. Contact us to discuss your training project and funding possibilities.
Risks associated with secrets exposure: definitions, realistic attack scenarios. Why and how to protect access information (API keys, passwords, tokens...). Overview of secrets management in the cloud and on-premises. Introduction to Secret Manager (generic concept and overview of GCP, AWS, Azure offerings).
Setting up a project with Secret Manager (Google Cloud, AWS Secrets Manager, Azure Key Vault). Creating and managing the lifecycle of secrets: insertion, update, deletion, versioning. Best practices for naming and organization. Assigning access rights and identity management (IAM, granular permissions). Using CLI tools, SDKs, and graphical interfaces.
Automating secrets rotation and setting up alerts. Integration into CI/CD pipelines (GitHub Actions, GitLab CI, Jenkins). Use in containers (Docker, Kubernetes Secrets). Logging, access audits, and best practices for compliance (GDPR, ISO/IEC 27001). Concrete scenarios: secure sharing of secrets between multiple teams/projects.
Target audience
Developers, DevOps engineers, and system administrators who need to secure access to sensitive information in applications or cloud infrastructures.
Prerequisites
Basic knowledge of software development and cloud infrastructures.
Loading...
Please wait a moment





























