Companies Home Search Profile

Application Security Posture Management: Security from the Supply Chain to Cloud Runtime

Focused View

1:54:35

0 View
  • 01 - Risks are everywhere.mp4
    00:43
  • 02 - What you should know.mp4
    00:41
  • 03 - How modern web applications are deployed.mp4
    04:55
  • 04 - DevOps best practices.mp4
    03:57
  • 05 - Security challenges in a DevOps world.mp4
    03:37
  • 06 - Everything you could possibly scan.mp4
    03:23
  • 07 - What youll actually want to do.mp4
    03:23
  • 08 - Challenge Diagram a workflow.mp4
    00:58
  • 09 - Solution Diagram a workflow.mp4
    04:41
  • 01 - Challenges with securing code.mp4
    04:34
  • 02 - Static application security testing (SAST).mp4
    04:50
  • 03 - Software bill of materials (SBOM).mp4
    05:14
  • 04 - Software composition analysis (SCA).mp4
    04:50
  • 05 - Secret scanning.mp4
    05:25
  • 06 - Infrastructure as code scanning.mp4
    03:27
  • 07 - Challenge Run your own scan.mp4
    00:59
  • 08 - Solution Run your own scan.mp4
    01:35
  • 01 - Challenges with securing supply chains.mp4
    04:26
  • 02 - Secure software development lifecycle (SSDLC).mp4
    05:27
  • 03 - Container vulnerability scanning.mp4
    05:46
  • 04 - Securing DevOps runners.mp4
    03:18
  • 05 - Approaches to container scanning.mp4
    02:28
  • 06 - Challenge Compare container base images.mp4
    00:56
  • 07 - Solution Compare container base images.mp4
    02:40
  • 01 - Dynamic application security testing (DAST).mp4
    03:57
  • 02 - Cloud security posture management (CSPM).mp4
    03:44
  • 03 - Emerging runtime security CADR and beyond.mp4
    04:32
  • 04 - Challenge Tell the attack story.mp4
    00:33
  • 05 - Solution Tell the attack story.mp4
    01:47
  • 01 - Getting it all done.mp4
    03:06
  • 02 - Operationalizing remediation programs.mp4
    03:44
  • 03 - What buy-in do you need.mp4
    03:43
  • 04 - Point solutions vs. all-in-one platforms.mp4
    03:02
  • 05 - Challenge Prioritize and remediate.mp4
    00:59
  • 06 - Solution Prioritize and remediate.mp4
    01:37
  • 01 - Continuing on with application security.mp4
    01:38
  • Description


    This course covers the core concepts and skills required to secure a modern, cloud-native application. Join instructor and security engineer James Berthoty as he provides a comprehensive overview of the emerging field of application security posture management (ASPM) and how it integrates a variety of different security tools used to secure applications from supply chain and other threats. Explore the fundamentals of code security, container security, runtime security, and remediating findings. Along the way, test out your new skills in the exercise challenges at the end of each section. Upon completing this course, you’ll be prepared to successfully argue for the value of different security tools in your development workflows, as well as implement a full program to operationalize those tools.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 36
    • duration 1:54:35
    • English subtitles has
    • Release Date 2025/01/22