DevSecOps Bootcamp
https://FreeCourseWeb.com
Released 11/2023 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 75 Lessons ( 14h 20m ) | Size: 3.1 GB
Stand out and 10x your value with this in-demand skills. Cybercrime is expected to cost companies 10.5 Trillion annually. With the rate of attacks increasing, the demand for DevSecOps skills is at an all-time high. Be recognized as a top tech professional and land high-paying jobs
You will be able to Drive adoption of DevSecOps at your company Automate security checks to prevent workflow bottlenecks Detect, visualize, analyze and remediate security vulnerabilities Secure AWS Cloud and write secure IaC Secure Kubernetes cluster with automation and security best practices
You will learn Various Security Scanning Tools, like GitLeaks, Semgrep, njsScan, RetireJS, Zap, Trivy, TFSec Secrets Management with Vault, KMS Various DevSecOps tools: DefectDojo, Vault, AWS Secrets Manager, InSpec Concepts and Tools for Observability, GitOps, Cloud Security, Image Security Compliance as Code, Policy as Code Roles and Responsibilities in DevSecOps in practice |
[ FreeCourseWeb.com ] DevSecOps Bootcamp
-
Get Bonus Downloads Here.url (0.2 KB)
~Get Your Files Here !
0 - Getting Started with the DevSecOps Bootcamp
-
1 - Why learn DevSecOps.mp4 (9.3 MB)
-
2 - Pre-Requisites of Bootcamp.mp4 (11.3 MB)
-
3 - DevSecOps Bootcamp Curriculum Overview.mp4 (83.2 MB)
-
4 - Support and Other Bootcamp Materials.mp4 (7.5 MB)
-
5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4 (6.3 MB)
-
01 - Security Essentials.pdf (9.8 MB)
-
02 - Intro to DevSecOps.pdf (9.0 MB)
-
03 - App Vulnerability Scanning.pdf (6.8 MB)
-
04 - Vulnerability Management.pdf (4.9 MB)
-
05 - Vulnerability Scanning for App Dependencies.pdf (4.2 MB)
-
06 - Set up CD Pipeline.pdf (5.7 MB)
-
07 - Image Scanning.pdf (7.2 MB)
-
08 - AWS Cloud Security and Access Management.pdf (4.7 MB)
-
09 - Secure Continuous Deployment & DAST.pdf (7.2 MB)
1 - Security Essentials
-
1 - Introduction to Security (1 - Security Essentials).mp4 (5.3 MB)
-
2 - Importance of Security & Impact of Security Breaches.mp4 (48.1 MB)
-
3 - How to Secure Systems Against Attacks.mp4 (12.8 MB)
-
4 - Types of Security Attacks - Part 1.mp4 (74.2 MB)
-
5 - Types of Security Attacks - Part 2.mp4 (73.2 MB)
-
6 - OWASP top 10 - Part 1.mp4 (105.5 MB)
-
7 - OWASP top 10 - Part 2.mp4 (79.8 MB)
-
8 - Security in Layers.mp4 (35.8 MB)
-
10 - IaC and GitOps for DevSecOps.pdf (7.2 MB)
10 - IaC and GitOps for DevSecOps
-
1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp4 (25.6 MB)
-
2 - Terraform Script for AWS Infrastructure Provisioning.mp4 (61.2 MB)
-
3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4 (25.0 MB)
-
4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4 (37.3 MB)
-
5 - Configure Remote State for Terraform.mp4 (27.1 MB)
-
6 - Add Automated Security Scan to TF Infrastructure Code.mp4 (35.6 MB)
-
7 - Understand IaC Concept Cattle vs Pets.mp4 (10.8 MB)
-
11 - Logging & Monitoring for Security.pdf (7.5 MB)
11 - Logging & Monitoring for Security
-
1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp4 (14.8 MB)
-
2 - Introduction to CloudTrail and CloudWatch.mp4 (15.0 MB)
-
3 - CloudTrail Event History.mp4 (32.3 MB)
-
4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4 (94.7 MB)
-
5 - Create CloudWatch Alarm for EC2 Instance.mp4 (62.6 MB)
-
6 - Create Custom Metric Filter for Failed Login Metrics.mp4 (41.4 MB)
-
7 - Configure Alarm for Failed Login Attempts.mp4 (36.1 MB)
-
8 - Configure AWS Budgets for Monthly Usage Costs.mp4 (22.5 MB)
-
9 - Complete Bootcamp Part 1 - Next Steps.mp4 (4.6 MB)
2 - Introduction to DevSecOps
-
1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps).mp4 (38.3 MB)
-
2 - Understand DevSecOps.mp4 (45.3 MB)
-
3 - Roles & Responsibilities in DevSecOps.mp4 (30.5 MB)
3 - Application Vulnerability Scanning
-
1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning).mp4 (69.6 MB)
-
2 - Impact of Missing Security Insights.mp4 (10.0 MB)
-
3 - Secret Scanning with GitLeaks - Local Environment.mp4 (49.8 MB)
-
4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4 (64.1 MB)
-
5 - False Positives & Fixing Security Vulnerabilities.mp4 (61.7 MB)
-
6 - Integrate SAST Scans in Release Pipeline.mp4 (79.5 MB)
4 - Vulnerability Management and Remediation
-
1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation).mp4 (31.8 MB)
-
2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4 (100.9 MB)
-
3 - Automate Uploading Security Scan Results to DefectDojo.mp4 (102.1 MB)
-
4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4 (63.1 MB)
5 - Vulnerability Scanning for Application Dependencies
-
1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies).mp4 (53.4 MB)
-
2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4 (42.6 MB)
-
3 - Overview of Static Security Scans in CI Pipeline.mp4 (4.1 MB)
6 - Build a CD Pipeline
-
1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp4 (8.1 MB)
-
2 - Introduction to Security Layers for AWS Access.mp4 (30.2 MB)
-
3 - Integrate CICD Pipeline with AWS ECR.mp4 (70.0 MB)
-
4 - Configure Application Deployment Environment on EC2 Server.mp4 (35.8 MB)
-
5 - Deploy Application to EC2 Server with Release Pipeline.mp4 (56.3 MB)
-
6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4 (56.1 MB)
-
7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4 (82.7 MB)
7 - Image Scanning - Build Secure Docker Images
-
1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images).mp4 (5.4 MB)
-
2 - Configure Automated Security Scanning in Application Image.mp4 (64.1 MB)
-
3 - Analyze & Fix Security Issues from Findings in Application Image.mp4 (79.6 MB)
-
4 - Automate Uploading Image Scanning Results in DefectDojo.mp4 (33.1 MB)
-
5 - Docker Security Best Practices.mp4 (38.5 MB)
-
6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4 (44.0 MB)
-
7 - Overview of Automated Application Code and Image Scanning Steps.mp4 (3.0 MB)
8 - AWS Cloud Security & Access Management
-
1 - AWS Security Essentials (8 - AWS Cloud Security & Access Management).mp4 (27.0 MB)
-
2 - Understand AWS Access Management using IAM Service.mp4 (7.2 MB)
-
3 - Securing AWS Root User Account.mp4 (23.8 MB)
-
4 - IAM Users, Groups & Policies.mp4 (27.0 MB)
-
5 - Secure Access from CICD Pipeline to AWS.mp4 (46.8 MB)
-
6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4 (18.2 MB)
-
7 - Overview of IAM Resources & Secure Access Management in AWS.mp4 (9.2 MB)
9 - Secure Continuous Deployment & DAST
-
1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deploymen
files
|
udp://tracker.torrent.eu.org:451/announce udp://tracker.tiny-vps.com:6969/announce http://tracker.foreverpirates.co:80/announce udp://tracker.cyberia.is:6969/announce udp://exodus.desync.com:6969/announce udp://explodie.org:6969/announce udp://tracker.opentrackr.org:1337/announce udp://9.rarbg.to:2780/announce udp://tracker.internetwarriors.net:1337/announce udp://ipv4.tracker.harry.lu:80/announce udp://open.stealth.si:80/announce udp://9.rarbg.to:2900/announce udp://9.rarbg.me:2720/announce udp://opentor.org:2710/announce |