17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
By Gurpreet Sachdeva Released Monday, December 31, 2018 New Release! (At Official Source Mistakenly Added Wrong Date.) Torrent Contains : 35 Files, 7 Folders Course Source : https://www.packtpub.com/virtualization-and-cloud/practical-devops-security-video
Secure DevOps - The Road to Continuous Security in development lifecycle
Video Details
ISBN 9781788394901 Course Length 1 hour 53 minutes
Table of Contents
• INTEGRATE SECURITY WITHIN DEVOPS • APPLYING SHIFT LEFT SECURITY APPROACH • SECURING DEVELOPMENT PRACTICES • SECURITY VERIFICATION IN THE PIPELINE • DEPLOY SECURE SOFTWARE • SECURITY IN SYSTEM MONITORING
Video Description
DevOps enables rapid application development while security teams follow a traditional way of performing security checks. If security (that is, configuration checks, code analysis, vulnerability scanning, and more) is not adequately automated then it leads to increased security violations and hacking/phishing attacks. Integrating security in the DevOps ethos helps fix flaws earlier in the development process. This course shows you how to apply DevOps security best practices at every stage in your DevOps pipeline. You will learn proven approaches to reducing vulnerability and strengthening your defenses against attack. You will understand using security as code with the intent of making security and compliance consumable as a service. This course explains how DevOps security practices differ from traditional security approaches and provides techniques to embed governance and cybersecurity functions throughout the DevOps workflow. By the end of the course, you will have learned best practices in DevSecOps, the core concepts of secure DevOps, and how security can be integrated into the development pipeline.
Style and Approach
A comprehensive course filled with step-by-step instructions, working examples, and practical insight. We take a web application and use OWASP DevSecOps Studio to show how to embed security verification in various stages of the product development pipeline. The entire course is segmented into small parts, which creates for an immersive learning experience. The different sections focus on one area and help you to decide your pace of learning.
What You Will Learn
• Integrating security into the DevOps culture and organization • Integrating Security into Continuous Delivery workflows for continuous security • Leverage Infrastructure as Code techniques for secure configuration management and provisioning • Eliminate manual security practices such as risk assessments and audits by automating all the verification • Build better defense mechanism by the use of Red and Blue teams • Create automatic compliance by using the DevOps Audit Defense Toolkit • Build continuous a feedback loop by automating all security checks throughout the Continuous Delivery pipeline
Authors
Gurpreet Sachdeva
Gurpreet Sachdeva is a Technology Executive with 21+ years' experience working on some of the most challenging technologies related to Cloud Computing, DevOps, and Security. Gurpreet did his B. Tech (C.S.) from NIT, Kurukshetra and M.S. (Software Systems) from BITS, Pilani. He is currently working as Assistant Vice President—Technology with Aricent, Gurgaon. He is a keen Java enthusiast and co-founder of Delhi – NCR – Java User Group. Gurpreet is an invited speaker in prestigious conferences such as Oracle – Java One, Great India Developer Summit. He blogs at www.thistechnologylife.com and has written a book on Elastic stack: https://amzn.to/2K8hTvD.
For More Udemy Free Courses >>> http://www.freetutorials.eu For more Lynda and other Courses >>> https://www.freecoursesonline.me/ Our Forum for discussion >>> https://discuss.freetutorials.eu/
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
01.Integrate Security within DevOps/0101.The Course Overview.mp4
21.8 MB
01.Integrate Security within DevOps/0102.Integrate Security for a DevOps World.mp4
9.3 MB
01.Integrate Security within DevOps/0103.Risk Management in a Rapidly Changing World.mp4
12.1 MB
01.Integrate Security within DevOps/0104.Key Principles and Benefits of Secure DevOps.mp4
11.3 MB
01.Integrate Security within DevOps/0105.Business-Driven Security Strategies.mp4
6.5 MB
01.Integrate Security within DevOps/0106.OWASP Security Guidelines.mp4
7.2 MB
02.Applying Shift Left Security Approach/0201.Integrating Security Into CICD Pipeline.mp4
44.7 MB
02.Applying Shift Left Security Approach/0202.Automated Security Testing.mp4
29.3 MB
02.Applying Shift Left Security Approach/0203.Tools of the Trade.mp4
59.3 MB
02.Applying Shift Left Security Approach/0204.Red and Blue Teams.mp4
29.5 MB
03.Securing Development Practices/0301.Security Requirements.mp4
44 MB
03.Securing Development Practices/0302.Architectural Considerations.mp4
16.8 MB
03.Securing Development Practices/0303.Threat Modeling, Data Flow Diagrams, and Attack Surface.mp4
72 MB
03.Securing Development Practices/0304.Identity and Access Management.mp4
35.2 MB
03.Securing Development Practices/0305.Code Inspection.mp4
30.1 MB
03.Securing Development Practices/0306.Environment Hardening.mp4
89.1 MB
04.Security Verification in the Pipeline/0401.What Is Static Application Security Testing.mp4
28.8 MB
04.Security Verification in the Pipeline/0402.Embed SAST into the CICD Pipeline.mp4
36.9 MB
04.Security Verification in the Pipeline/0403.What Is Dynamic Application Security Testing.mp4
20.1 MB
04.Security Verification in the Pipeline/0404.Embed DAST Into the Pipeline.mp4
61.1 MB
04.Security Verification in the Pipeline/0405.Runtime Application Self-Protection (RASP) versus Interactive Application Security Testing (IAST).mp4
22.1 MB
04.Security Verification in the Pipeline/0406.Software Composition Analysis.mp4
13.6 MB
05.Deploy Secure Software/0501.Infrastructure as Code.mp4
48.2 MB
05.Deploy Secure Software/0502.Key Management and Identity Management.mp4
26.1 MB
05.Deploy Secure Software/0503.Chaos Monkey and Fuzz Testing.mp4
25.1 MB
06.Security in System Monitoring/0601.Security Monitoring.mp4
49.1 MB
06.Security in System Monitoring/0602.Governance, Risk, Compliance and Audit.mp4
40 MB
06.Security in System Monitoring/0603.Incident Response and Forensics.mp4