DevSecOps Bootcamp
Focused View
14:18:17
36 View
1 - Why learn DevSecOps.mp4
02:09
2 - Pre-Requisites of Bootcamp.mp4
03:43
3 - DevSecOps Bootcamp Curriculum Overview.mp4
26:17
4 - Support and Other Bootcamp Materials.mp4
02:00
5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4
01:29
1 - Introduction to Security (1 - Security Essentials).mp4
01:32
2 - Importance of Security & Impact of Security Breaches.mp4
13:53
3 - How to Secure Systems Against Attacks.mp4
03:48
4 - Types of Security Attacks - Part 1.mp4
19:58
5 - Types of Security Attacks - Part 2.mp4
20:14
6 - OWASP top 10 - Part 1.mp4
34:26
7 - OWASP top 10 - Part 2.mp4
24:32
8 - Security in Layers.mp4
10:54
1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps).mp4
11:46
2 - Understand DevSecOps.mp4
13:43
3 - Roles & Responsibilities in DevSecOps.mp4
09:06
1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning).mp4
26:02
2 - Impact of Missing Security Insights.mp4
03:00
3 - Secret Scanning with GitLeaks - Local Environment.mp4
13:10
4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4
19:46
5 - False Positives & Fixing Security Vulnerabilities.mp4
16:23
6 - Integrate SAST Scans in Release Pipeline.mp4
20:30
1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation).mp4
09:19
2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4
25:19
3 - Automate Uploading Security Scan Results to DefectDojo.mp4
29:00
4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4
16:17
1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies).mp4
15:05
2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4
09:57
3 - Overview of Static Security Scans in CI Pipeline.mp4
00:57
1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp4
02:10
2 - Introduction to Security Layers for AWS Access.mp4
08:16
3 - Integrate CICD Pipeline with AWS ECR.mp4
19:37
4 - Configure Application Deployment Environment on EC2 Server.mp4
08:39
5 - Deploy Application to EC2 Server with Release Pipeline.mp4
15:50
6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4
14:13
7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4
19:11
1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images).mp4
01:22
2 - Configure Automated Security Scanning in Application Image.mp4
14:01
3 - Analyze & Fix Security Issues from Findings in Application Image.mp4
17:21
4 - Automate Uploading Image Scanning Results in DefectDojo.mp4
08:37
5 - Docker Security Best Practices.mp4
10:14
6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4
11:23
7 - Overview of Automated Application Code and Image Scanning Steps.mp4
00:49
1 - AWS Security Essentials (8 - AWS Cloud Security & Access Management).mp4
07:11
2 - Understand AWS Access Management using IAM Service.mp4
01:55
3 - Securing AWS Root User Account.mp4
06:29
4 - IAM Users, Groups & Policies.mp4
08:04
5 - Secure Access from CICD Pipeline to AWS.mp4
15:40
6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4
05:07
7 - Overview of IAM Resources & Secure Access Management in AWS.mp4
02:35
1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deployment & DAST).mp4
06:46
2 - Configure AWS Systems Manager for EC2 Server.mp4
11:39
3 - AWS SSM Commands in Release Pipeline for Server Access.mp4
12:24
4 - Secure Continuous Deployment to Server using SSM.mp4
12:55
5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp4
13:54
6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4
02:47
7 - Understand Dynamic Application Security Testing (DAST).mp4
08:33
8 - Configure Automated DAST Scans in CICD Pipeline.mp4
22:20
9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4
02:13
1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp4
07:27
2 - Terraform Script for AWS Infrastructure Provisioning.mp4
18:55
3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4
08:39
4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4
13:18
5 - Configure Remote State for Terraform.mp4
09:36
6 - Add Automated Security Scan to TF Infrastructure Code.mp4
11:47
7 - Understand IaC Concept Cattle vs Pets.mp4
03:10
1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp4
04:30
2 - Introduction to CloudTrail and CloudWatch.mp4
04:32
3 - CloudTrail Event History.mp4
08:55
4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4
23:36
5 - Create CloudWatch Alarm for EC2 Instance.mp4
18:57
6 - Create Custom Metric Filter for Failed Login Metrics.mp4
09:59
7 - Configure Alarm for Failed Login Attempts.mp4
10:44
8 - Configure AWS Budgets for Monthly Usage Costs.mp4
06:37
9 - Complete Bootcamp Part 1 - Next Steps.mp4
01:05
More details
User Reviews
Rating
average 0
Focused display
Category

Udemy
View courses UdemyStudents take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
- language english
- Training sessions 75
- duration 14:18:17
- Release Date 2023/12/29