Companies Home Search Profile

DevSecOps Bootcamp

Focused View

14:18:17

36 View
  • 1 - Why learn DevSecOps.mp4
    02:09
  • 2 - Pre-Requisites of Bootcamp.mp4
    03:43
  • 3 - DevSecOps Bootcamp Curriculum Overview.mp4
    26:17
  • 4 - Support and Other Bootcamp Materials.mp4
    02:00
  • 5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4
    01:29
  • 1 - Introduction to Security (1 - Security Essentials).mp4
    01:32
  • 2 - Importance of Security & Impact of Security Breaches.mp4
    13:53
  • 3 - How to Secure Systems Against Attacks.mp4
    03:48
  • 4 - Types of Security Attacks - Part 1.mp4
    19:58
  • 5 - Types of Security Attacks - Part 2.mp4
    20:14
  • 6 - OWASP top 10 - Part 1.mp4
    34:26
  • 7 - OWASP top 10 - Part 2.mp4
    24:32
  • 8 - Security in Layers.mp4
    10:54
  • 1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps).mp4
    11:46
  • 2 - Understand DevSecOps.mp4
    13:43
  • 3 - Roles & Responsibilities in DevSecOps.mp4
    09:06
  • 1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning).mp4
    26:02
  • 2 - Impact of Missing Security Insights.mp4
    03:00
  • 3 - Secret Scanning with GitLeaks - Local Environment.mp4
    13:10
  • 4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4
    19:46
  • 5 - False Positives & Fixing Security Vulnerabilities.mp4
    16:23
  • 6 - Integrate SAST Scans in Release Pipeline.mp4
    20:30
  • 1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation).mp4
    09:19
  • 2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4
    25:19
  • 3 - Automate Uploading Security Scan Results to DefectDojo.mp4
    29:00
  • 4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4
    16:17
  • 1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies).mp4
    15:05
  • 2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4
    09:57
  • 3 - Overview of Static Security Scans in CI Pipeline.mp4
    00:57
  • 1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp4
    02:10
  • 2 - Introduction to Security Layers for AWS Access.mp4
    08:16
  • 3 - Integrate CICD Pipeline with AWS ECR.mp4
    19:37
  • 4 - Configure Application Deployment Environment on EC2 Server.mp4
    08:39
  • 5 - Deploy Application to EC2 Server with Release Pipeline.mp4
    15:50
  • 6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4
    14:13
  • 7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4
    19:11
  • 1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images).mp4
    01:22
  • 2 - Configure Automated Security Scanning in Application Image.mp4
    14:01
  • 3 - Analyze & Fix Security Issues from Findings in Application Image.mp4
    17:21
  • 4 - Automate Uploading Image Scanning Results in DefectDojo.mp4
    08:37
  • 5 - Docker Security Best Practices.mp4
    10:14
  • 6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4
    11:23
  • 7 - Overview of Automated Application Code and Image Scanning Steps.mp4
    00:49
  • 1 - AWS Security Essentials (8 - AWS Cloud Security & Access Management).mp4
    07:11
  • 2 - Understand AWS Access Management using IAM Service.mp4
    01:55
  • 3 - Securing AWS Root User Account.mp4
    06:29
  • 4 - IAM Users, Groups & Policies.mp4
    08:04
  • 5 - Secure Access from CICD Pipeline to AWS.mp4
    15:40
  • 6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4
    05:07
  • 7 - Overview of IAM Resources & Secure Access Management in AWS.mp4
    02:35
  • 1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deployment & DAST).mp4
    06:46
  • 2 - Configure AWS Systems Manager for EC2 Server.mp4
    11:39
  • 3 - AWS SSM Commands in Release Pipeline for Server Access.mp4
    12:24
  • 4 - Secure Continuous Deployment to Server using SSM.mp4
    12:55
  • 5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp4
    13:54
  • 6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4
    02:47
  • 7 - Understand Dynamic Application Security Testing (DAST).mp4
    08:33
  • 8 - Configure Automated DAST Scans in CICD Pipeline.mp4
    22:20
  • 9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4
    02:13
  • 1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp4
    07:27
  • 2 - Terraform Script for AWS Infrastructure Provisioning.mp4
    18:55
  • 3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4
    08:39
  • 4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4
    13:18
  • 5 - Configure Remote State for Terraform.mp4
    09:36
  • 6 - Add Automated Security Scan to TF Infrastructure Code.mp4
    11:47
  • 7 - Understand IaC Concept Cattle vs Pets.mp4
    03:10
  • 1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp4
    04:30
  • 2 - Introduction to CloudTrail and CloudWatch.mp4
    04:32
  • 3 - CloudTrail Event History.mp4
    08:55
  • 4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4
    23:36
  • 5 - Create CloudWatch Alarm for EC2 Instance.mp4
    18:57
  • 6 - Create Custom Metric Filter for Failed Login Metrics.mp4
    09:59
  • 7 - Configure Alarm for Failed Login Attempts.mp4
    10:44
  • 8 - Configure AWS Budgets for Monthly Usage Costs.mp4
    06:37
  • 9 - Complete Bootcamp Part 1 - Next Steps.mp4
    01:05
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 75
    • duration 14:18:17
    • Release Date 2023/12/29