Master StrongDM — from zero-trust architecture to secrets management — so your infrastructure stays secure, auditable, and always under control.
Structured courses built from real-world deployments — from foundational proxy architecture to advanced secrets management.
Track your mastery across the StrongDM ecosystem. Click nodes to toggle completion.
Policy-based access control with Cedar syntax. No standing privileges — every session is earned and audited.
Integrate secret stores, certificate authorities, and credential leasing into your deployment architecture.
Design high-availability gateway topologies, proxy clusters, and Terraform-powered scaling patterns.
IdP integration, MFA providers, service accounts, and proxy credential management across your stack.
K8s credential leasing, identity aliases, kubectl proxy setup, and namespace-level access control.
Configure log types, storage destinations, streaming pipelines, and retention policies for full auditability.