Companies Home Search Profile

SEC540 Cloud Security and DevOps Automation

Focused View

33:14:07

141 View
  • 1. Course and Lab Setup.mp4
    24:15
  • 2. Introduction to Cloud and DevOps.mp4
    55:05
  • 3. Continuous Delivery.mp4
    42:42
  • 4. Secure Continuous Delivery.mp4
    02:11:01
    • 1. Course and Lab Setup
    • 1. Introduction to DevSecOps.mp4
      06:07
    • 2. SANS DevSecOps Curriculum.mp4
      00:40
    • 3. Course Roadmap.mp4
      00:07
    • 4. Lab VM Overview.mp4
      01:20
    • 5. Lab Environment Overview.mp4
      02:58
    • 6. Cloud Free Tier Accounts.mp4
      02:08
    • 7. AWS Account Activation.mp4
      00:45
    • 8. AWS EC2 Limits.mp4
      00:49
    • 9. AWS Root User Account.mp4
      01:21
    • 10. AWS Access Keys.mp4
      00:14
    • 11. Lab 10 Getting Started.mp4
      00:21
    • 12. Lab 10 Summary AWS Account Configuration.mp4
      07:19
      2. Introduction to Cloud and DevOps
    • 1. Course Roadmap 1.mp4
      01:27
    • 2. The Dev Ops Disconnect The Need for Speed.mp4
      02:01
    • 3. Walls of Confusion.mp4
      03:42
    • 4. The DevOps Solution.mp4
      02:26
    • 5. Current State of DevOps.mp4
      02:49
    • 6. DevOps Unicorns.mp4
      01:07
    • 7. Enterprise DevOps Horses not Unicorns.mp4
      00:58
    • 8. Cloud Infrastructure Leaders.mp4
      01:02
    • 9. Cloud Provider Comparison.mp4
      01:01
    • 10. Azure Security Features.mp4
      04:47
    • 11. AWS Security.mp4
      00:55
    • 12. Amazon AWS Shared Responsibility Model.mp4
      01:09
    • 13. Course Roadmap 2.mp4
      00:01
    • 14. Working in DevOps CAMS and CALMS.mp4
      00:39
    • 15. CALMS CultureVisible Signs of a DevOps Culture.mp4
      01:39
    • 16. CALMS Culture at Netflix.mp4
      02:49
    • 17. CALMS Automation.mp4
      00:55
    • 18. CALMS Automate All the Things Everything as Code.mp4
      01:35
    • 19. CALMS Automation at Amazon.mp4
      02:27
    • 20. CALMS Lean.mp4
      01:53
    • 21. CALMS Lean at ING Group.mp4
      03:21
    • 22. CALMS Measurement.mp4
      00:28
    • 23. CALMS Measurement Security Metrics.mp4
      00:56
    • 24. CALMS Measurement at Etsy.mp4
      00:42
    • 25. CALMS Sharing.mp4
      01:45
    • 26. CALMS Sharing at Google.mp4
      00:27
    • 27. Current State of DevOps Security.mp4
      02:15
    • 28. CALMS Culture DevOps Culture and Security.mp4
      00:15
    • 29. Security Challenges in DevOps.mp4
      00:14
    • 30. Security Challenges in DevOps Technology.mp4
      01:20
    • 31. Security Challenges in DevOps Integrity and Availability.mp4
      01:09
    • 32. Security Challenges in DevOps Confidentiality.mp4
      02:03
    • 33. Security Challenges in DevOps Compensating Controls.mp4
      00:58
    • 34. Risks of Frequent Change.mp4
      00:18
    • 35. Making Frequent Change Safe.mp4
      00:47
    • 36. Big Changes Big Risks Small Changes Small Risks.mp4
      00:08
    • 37. SecDevOps DevSecOps DevOpsSec Rugged DevOps.mp4
      00:37
    • 38. Closing the Window of Exposure.mp4
      00:52
    • 39. DevOps Introduction Summary.mp4
      00:51
      3. Continuous Delivery
    • 1. Course Roadmap 1.mp4
      00:06
    • 2. DevOps Deployment Kata.mp4
      01:23
    • 3. Lab 11 Deployment Kata.mp4
      00:14
    • 4. Lab 11 Summary Deployment Kata.mp4
      08:43
    • 5. Course Roadmap 2.mp4
      00:05
    • 6. Continuous Delivery Automating and Standardizing Change.mp4
      04:20
    • 7. Continuous Integration CI.mp4
      01:03
    • 8. Security Testing in Continuous Integration CI.mp4
      02:42
    • 9. Continuous Delivery CD.mp4
      00:56
    • 10. Continuous Delivery at LMAX.mp4
      01:55
    • 11. Continuous Delivery vs Continuous Deployment.mp4
      01:02
    • 12. Continuous Deployment.mp4
      04:13
    • 13. CD Deployment Smoke Test and Health Checks.mp4
      02:25
    • 14. CD Pipeline Rules.mp4
      01:44
    • 15. Continuous Delivery Platforms.mp4
      00:34
    • 16. Monitoring Your CD Pipelines.mp4
      00:45
    • 17. Managing Continuous Delivery at Capital One.mp4
      00:57
    • 18. Capital One Continuous Delivery Clean Room.mp4
      00:43
    • 19. Capital One Delivery Pipeline Governance.mp4
      00:56
    • 20. Jenkins Continuous Integration and Delivery.mp4
      01:36
    • 21. Jenkins Blue Ocean Visualizing and Modeling Pipelines.mp4
      00:43
    • 22. Considerations in Using Jenkins for CD.mp4
      01:22
    • 23. Lab Environment Jenkins Pipeline.mp4
      00:15
    • 24. Jenkins Pipeline Stages 1.mp4
      00:27
    • 25. Jenkins Pipeline Stages 2.mp4
      00:17
    • 26. Jenkins Pipeline as Code Declarative Syntax.mp4
      01:21
    • 27. Jenkins Credential Manager.mp4
      00:50
    • 28. The CD Pipeline Summary.mp4
      00:50
      4. Secure Continuous Delivery
    • 1. Course Roadmap 1.mp4
      00:09
    • 2. Understand DevOps and CD Before Securing Them.mp4
      01:06
    • 3. Secure Continuous Delivery at Twitter.mp4
      08:04
    • 4. Integrating Security into Continuous Delivery.mp4
      00:11
    • 5. Continuous Delivery Pipeline.mp4
      01:07
    • 6. Security Controls Mapped to CD Stages.mp4
      00:10
    • 7. Course Roadmap 2.mp4
      01:10
    • 8. Security in CD PreCommit Stage.mp4
      00:47
    • 9. Risk Assessments and Threat Modeling Challenges.mp4
      01:33
    • 10. Rapid Risk Assessments.mp4
      04:58
    • 11. Threat Modeling in DevOps.mp4
      02:59
    • 12. Version ControlSource Code Management.mp4
      00:47
    • 13. Git Concepts.mp4
      00:48
    • 14. Git Workflow Visual Overview.mp4
      01:44
    • 15. Git Workflow Clone and Edit.mp4
      00:16
    • 16. Git Workflow CommitShare a Change.mp4
      00:14
    • 17. Git Workflow Share Change with Another Remote.mp4
      00:07
    • 18. Git CommitWorkflow Hooks.mp4
      03:57
    • 19. Git Code Owners.mp4
      01:21
    • 20. Code Owners Security Review for HighRisk Code Changes.mp4
      01:47
    • 21. Unit Testing.mp4
      01:43
    • 22. Unit Testing Example of a Simple Unit Test.mp4
      01:39
    • 23. Effective Unit Testing for Security.mp4
      01:23
    • 24. Unit Testing for Security Test Coverage.mp4
      02:36
    • 25. Unit Testing for Security Get Off of the Happy Path.mp4
      00:35
    • 26. Unit Testing for Security Logon Example Happy Path.mp4
      01:02
    • 27. Unit Testing for Security Logon Example IAMROOT.mp4
      01:23
    • 28. Unit Testing for Security Access Control.mp4
      00:59
    • 29. Unit Testing for Security Alert on HighRisk Code Changes.mp4
      01:28
    • 30. TestDriven Security.mp4
      00:46
    • 31. Static Analysis in CD Developer SelfService.mp4
      00:45
    • 32. Static Analysis in CD Catch Problems in IDE.mp4
      02:15
    • 33. Security in CD Manual Code Reviews.mp4
      01:20
    • 34. Managing Code Reviews with Workflow Automation.mp4
      00:12
    • 35. Code Review Description Templates.mp4
      01:08
    • 36. Lab 12 PreCommit Security.mp4
      00:51
    • 37. Lab 12 Summary PreCommit Security.mp4
      10:39
    • 38. Course Roadmap 3.mp4
      00:30
    • 39. Security in CD Commit Stage.mp4
      01:06
    • 40. Commit Stage Executing Unit Tests.mp4
      00:18
    • 41. Commit Stage Static Analysis Scanning in CD Pipeline.mp4
      03:38
    • 42. Static Analysis Minimize False Positives.mp4
      00:50
    • 43. Static Analysis Getting Value from Your Tools.mp4
      02:29
    • 44. Static Analysis Finding the Right Tool.mp4
      00:29
    • 45. SAST Technology Landscape.mp4
      00:29
    • 46. SAST Technology Landscape Configuration Management.mp4
      00:48
    • 47. SAST Technology Landscape Language Support 1.mp4
      01:38
    • 48. SAST Technology Landscape Language Support 2.mp4
      00:58
    • 49. Application Security Vulnerability Management Open Source.mp4
      01:29
    • 50. Vulnerability Management in DevOps.mp4
      00:17
    • 51. Managing Vulnerabilities using OWASP DefectDojo.mp4
      00:15
    • 52. Application Security Vulnerability Management Code Dx.mp4
      00:46
    • 53. Managing Vulnerable Dependencies Component Analysis.mp4
      03:38
    • 54. Managing Vulnerable Dependencies OpenSource Tools.mp4
      02:09
    • 55. Managing Vulnerable Dependencies Commercial Tools.mp4
      00:51
    • 56. Component Management Fewer Better Suppliers.mp4
      02:30
    • 57. CD Store Binaries in Artifact Repository.mp4
      00:24
    • 58. Lab Prerequisites Static Code Analysis Phan.mp4
      00:17
    • 59. Lab Prerequisites Running Phans CLI.mp4
      00:12
    • 60. Lab 13 Automating Static Analysis.mp4
      00:55
    • 61. Lab 13 Summary Automating Static Analysis.mp4
      07:26
    • 62. Course Roadmap 4.mp4
      00:12
    • 63. Security in CD Acceptance Stage.mp4
      00:31
    • 64. CD ProvisionConfigure Test System.mp4
      01:25
    • 65. Testing in CD Follow the Test Pyramid.mp4
      02:36
    • 66. Acceptance Phase Kinds of Security Tests.mp4
      01:46
    • 67. Dynamic Scanning DAST in CICD Challenges.mp4
      01:16
    • 68. Dynamic Scanning DAST in CICD Success Factors.mp4
      01:59
    • 69. Dynamic Scanning in CICD OWASP ZAP.mp4
      01:01
    • 70. Scanning APIs in CICD Using OWASP ZAP.mp4
      00:33
    • 71. Dynamic Scanning in CICD Arachni.mp4
      00:25
    • 72. Wiring Security Attacks into CD.mp4
      01:10
    • 73. Security Attacks Introduction to Gauntlt.mp4
      00:27
    • 74. Gauntlt BDD and Gherkin DSL.mp4
      00:28
    • 75. Gauntlt Attack Adapters.mp4
      00:47
    • 76. Gauntlt Attacks Example.mp4
      01:47
    • 77. Automating Security Testing in CD OWASP Glue.mp4
      00:40
    • 78. Fuzzing in Continuous Delivery.mp4
      01:05
    • 79. Limits to Automated Security Tests.mp4
      00:31
    • 80. LongRunning Security Tests in CD.mp4
      00:15
    • 81. Integrating Manual ReviewsTesting in CD.mp4
      01:33
    • 82. Penetration Testing in DevOps.mp4
      00:45
    • 83. OWASP AppSec Pipeline Project.mp4
      01:11
    • 84. OWASP AppSec Pipeline Template.mp4
      00:23
    • 85. OWASP AppSec Pipeline Integration.mp4
      01:49
    • 86. CD Staging and Rehearsal.mp4
      00:15
    • 87. Lab 14 Automating Dynamic Analysis.mp4
      00:29
    • 88. Lab 14 Summary Automating Dynamic Analysis.mp4
      05:16
    • 89. Secure Continuous Delivery Summary.mp4
      00:39
    • 90. NetWars Bonus Challenges.mp4
      00:28
    • 91. Course Roadmap 5.mp4
      00:17
  • 1. Cloud Security Fundamentals.mp4
    55:51
  • 2. Secure Infrastructure as Code.mp4
    58:38
  • 3. Configuration Management as Code.mp4
    40:40
  • 4. Container Security.mp4
    01:01:41
    • 1. Cloud Security Fundamentals
    • 1. Cloud Infrastructure and Orchestration.mp4
      01:42
    • 2. Security in CD Production.mp4
      01:11
    • 3. Course Roadmap 1.mp4
      00:01
    • 4. Lab Environment Overview.mp4
      01:17
    • 5. AWS Regions and Availability Zones.mp4
      02:04
    • 6. AWS Regions Supported by the Course.mp4
      01:59
    • 7. Cloud Access Methods.mp4
      03:15
    • 8. Azure Command Line Interface CLI.mp4
      02:13
    • 9. Azure Command Line Interface CLI Getting Started.mp4
      00:34
    • 10. Azure CLI Common Commands.mp4
      00:41
    • 11. AWS Command Line Interface.mp4
      02:10
    • 12. AWS CLI Basics.mp4
      00:50
    • 13. AWS Identity and Access Management IAM.mp4
      01:35
    • 14. EC2 Key Pairs.mp4
      01:39
    • 15. AWS CLI EC2 Create Key Pair.mp4
      00:21
    • 16. Lab Resources and Setup.mp4
      00:12
    • 17. Lab 21 AWS and Jenkins Configuration.mp4
      00:30
    • 18. Lab 21 Summary AWS and Jenkins Configuration.mp4
      05:29
    • 19. Course Roadmap 2.mp4
      00:37
    • 20. AWS Core Building Blocks.mp4
      01:26
    • 21. Virtual Private Cloud VPC.mp4
      02:48
    • 22. AWS CLI EC2 Describe VPCs.mp4
      00:48
    • 23. Internet Gateway IGW.mp4
      00:32
    • 24. Classless InterDomain Routing CIDR.mp4
      02:20
    • 25. Subnets.mp4
      00:54
    • 26. AWS CLI EC2 DescribeSubnets.mp4
      01:02
    • 27. Public Subnets.mp4
      00:29
    • 28. Public Route Table.mp4
      00:26
    • 29. Warning Yes Public Subnets are Public.mp4
      01:09
    • 30. Private Subnets.mp4
      00:47
    • 31. Network Address Translation NAT Gateway.mp4
      02:23
    • 32. Subnet Network Access Control Lists NACLs.mp4
      00:41
    • 33. NACL Rules Public and Private Subnet.mp4
      02:55
    • 34. Elastic Compute Cloud EC2.mp4
      00:25
    • 35. Amazon Machine Images AMI.mp4
      02:08
    • 36. EC2 Security Groups.mp4
      01:32
    • 37. Security Groups Public and Private Subnet.mp4
      01:14
    • 38. Dunder Mifflin Virtual Private Cloud.mp4
      01:41
    • 39. Management Subnets.mp4
      01:33
      2. Secure Infrastructure as Code
    • 1. Course Roadmap 1.mp4
      01:08
    • 2. Setting Up Systems Infrastructure.mp4
      03:18
    • 3. What Is Infrastructure as Code.mp4
      01:35
    • 4. From Infrastructure to Code.mp4
      01:56
    • 5. Infrastructure as Code Testing.mp4
      01:25
    • 6. Infrastructure as Code TestDriven Infrastructure TDI.mp4
      00:26
    • 7. Basics of Secure Infrastructure as Code.mp4
      01:30
    • 8. Infrastructure as Code Hardening.mp4
      01:40
    • 9. Cloud Infrastructure as Code Services.mp4
      00:11
    • 10. Course Roadmap 2.mp4
      00:15
    • 11. Azure Resource Manager ARM.mp4
      01:10
    • 12. Azure Resource Manager ARM Benefits.mp4
      00:56
    • 13. Azure Resource Manager ARM Considerations.mp4
      01:11
    • 14. Terraform by HashiCorp.mp4
      00:44
    • 15. Terraform Benefits.mp4
      00:33
    • 16. Terraform Considerations.mp4
      01:50
    • 17. Terraform Providers.mp4
      00:43
    • 18. Terraform Provisioner.mp4
      01:07
    • 19. Terraform Command Line Interface CLI.mp4
      01:21
    • 20. HCL Basics Input Variables.mp4
      02:46
    • 21. HCL Basics Provider.mp4
      01:33
    • 22. HCL Basics Resource.mp4
      02:09
    • 23. HCL Basics Data Source.mp4
      00:57
    • 24. HCL Basics Null Resource and Local Provisioner.mp4
      00:48
    • 25. HCL Basic Outputs.mp4
      00:45
    • 26. Course Roadmap 3.mp4
      00:05
    • 27. CloudFormation.mp4
      00:31
    • 28. CloudFormation Templates.mp4
      00:28
    • 29. CloudFormation Template Functions.mp4
      00:48
    • 30. CloudFormation Parameters.mp4
      00:47
    • 31. CloudFormation Mappings.mp4
      00:46
    • 32. CloudFormation Mapping Example.mp4
      00:55
    • 33. Cloud Formation Resources.mp4
      00:05
    • 34. CloudFormation Resource Example.mp4
      01:18
    • 35. CloudFormation Resource Tags.mp4
      02:35
    • 36. CloudFormation Resource Security Group.mp4
      00:46
    • 37. CloudFormation EC2 Instance Profiles.mp4
      02:06
    • 38. CloudFormation EC2 Instance Profile S3 Example.mp4
      00:12
    • 39. CloudFormation IAM Role.mp4
      00:54
    • 40. CloudFormation IAM Policy.mp4
      00:54
    • 41. IAM Policy Simulator.mp4
      00:36
    • 42. CloudFormation EC2 User Data.mp4
      01:06
    • 43. CloudFormation Resource EC2 Instance.mp4
      01:11
    • 44. CloudFormation Outputs.mp4
      00:11
    • 45. AWS CLI CloudFormation Deploy Stack.mp4
      00:44
    • 46. CloudFormation Nested Stacks.mp4
      00:19
    • 47. CloudFormation Help Getting Started.mp4
      00:16
    • 48. CloudFormation Designer Interface.mp4
      00:51
    • 49. Dunder Mifflin Virtual Private Cloud.mp4
      00:08
    • 50. Lab Prerequisites.mp4
      00:42
    • 51. Managing SSLTLS Certificates.mp4
      00:26
    • 52. Uploading SSLTLS Certificates.mp4
      00:18
    • 53. CloudFormation Nag Security Scanner.mp4
      00:37
    • 54. CloudFormation Nag Running a Scan.mp4
      00:17
    • 55. CloudFormation Nag Suppressing False Positives.mp4
      00:12
    • 56. Lab 22 CloudFormation Automation.mp4
      00:12
    • 57. Lab 22 Summary CloudFormation Automation.mp4
      04:56
      3. Configuration Management as Code
    • 1. Course Roadmap 1.mp4
      00:36
    • 2. Configuration Management Tooling.mp4
      01:20
    • 3. Configuration Management Chef.mp4
      01:54
    • 4. Securing Chef Environment.mp4
      00:39
    • 5. Configuration Management Puppet.mp4
      02:29
    • 6. Securing Puppet.mp4
      00:23
    • 7. Configuration Management Ansible.mp4
      03:43
    • 8. Configuration Management SaltSaltStack.mp4
      00:35
    • 9. Provisioning Development and Test VM Vagrant.mp4
      01:44
    • 10. Building Gold Images Packer.mp4
      00:57
    • 11. Network as Code.mp4
      00:32
    • 12. Network as Code Tooling.mp4
      01:57
    • 13. Databases in DevOps.mp4
      01:12
    • 14. Database as Code Tooling.mp4
      01:24
    • 15. Course Roadmap 2.mp4
      00:21
    • 16. Puppet Basics Major Components of Puppet.mp4
      01:03
    • 17. Puppet Basics The Puppet DSL.mp4
      00:49
    • 18. Puppet Package File Service Pattern.mp4
      00:17
    • 19. Puppet Package File Service PatternExample.mp4
      00:57
    • 20. Writing Clean Puppet Code Best PracticesStyle Guides.mp4
      00:22
    • 21. Writing Clean Puppet Code Tools.mp4
      00:21
    • 22. Writing Clean Puppet Code Modules and Patterns 1.mp4
      01:23
    • 23. Writing Clean Puppet Code Modules and Patterns 2.mp4
      00:58
    • 24. Automated Testing of Puppet Code.mp4
      01:58
    • 25. Puppet Using Puppet with AWS.mp4
      00:48
    • 26. Puppet Auditing and Reporting.mp4
      01:03
    • 27. Security and Compliance with Puppet SIMP.mp4
      00:32
    • 28. Lab 23 Manage Configuration with Puppet.mp4
      01:19
    • 29. Lab 23 Summary Manage Configuration with Puppet.mp4
      08:30
    • 30. Secure Infrastructure as Code Summary.mp4
      00:19
      4. Container Security
    • 1. Course Roadmap 1.mp4
      00:26
    • 2. What Are Containers.mp4
      00:36
    • 3. Containers vs VMs.mp4
      03:30
    • 4. Container Standards.mp4
      01:41
    • 5. Docker Ecosystem.mp4
      01:13
    • 6. Docker Editions.mp4
      00:54
    • 7. Writing Dockerfiles.mp4
      02:28
    • 8. Writing Dockerfiles Best Practices.mp4
      00:19
    • 9. Course Roadmap 2.mp4
      00:06
    • 10. Container Security Advantages.mp4
      02:25
    • 11. Container Security Issues.mp4
      01:28
    • 12. Docker Daemon Attack Surface.mp4
      00:28
    • 13. Docker Authentication and Authorization.mp4
      02:27
    • 14. Handling Secrets in Docker.mp4
      01:13
    • 15. Container Security Isolation.mp4
      02:07
    • 16. Container Security User Namespacing.mp4
      02:52
    • 17. Container Security Image Poisoning.mp4
      00:41
    • 18. Container Security Official Images.mp4
      02:04
    • 19. Container Security Image Scanning.mp4
      00:31
    • 20. Container Security Docker Security Scanning.mp4
      00:20
    • 21. Container Security OpenSource Docker Scanners.mp4
      01:14
    • 22. Container Security Commercial Docker Scanners.mp4
      00:48
    • 23. Docker Content Trust.mp4
      00:45
    • 24. Docker Trusted Registry.mp4
      00:47
    • 25. Using Docker with an Artifact Repository Manager.mp4
      00:20
    • 26. Container Security Docker Hosts.mp4
      01:22
    • 27. Container Security Hardening the OS Kernel.mp4
      01:14
    • 28. Container Security Hardening Basics Specifically for Docker.mp4
      01:37
    • 29. Container Security Limit Size of Images.mp4
      01:11
    • 30. Docker Security Dropping Capabilities on Linux.mp4
      01:38
    • 31. Docker Security cgroups.mp4
      00:29
    • 32. Docker Seccomp.mp4
      01:07
    • 33. Container Security Docker Hardening Guidelines.mp4
      00:31
    • 34. Container Security CIS Benchmark for Docker.mp4
      00:29
    • 35. NIST SP 800190 Application Container Security Guide.mp4
      00:17
    • 36. Container Security NIST Life Cycle Considerations.mp4
      00:45
    • 37. Container Security Attacking Docker.mp4
      00:34
    • 38. Container Security Commercial Runtime Defense Solutions.mp4
      02:06
    • 39. Docker Alternatives MicroVMs and Kernel Sandboxes.mp4
      02:54
    • 40. Lab 24 Audit Dockers Security.mp4
      01:46
    • 41. Lab 24 Summary Audit Dockers Security.mp4
      11:16
    • 42. Docker Security Summary.mp4
      00:21
    • 43. NetWars Bonus Challenges.mp4
      00:01
    • 44. Course Roadmap 3.mp4
      00:01
  • 1. Cloud Security Operations.mp4
    58:32
  • 2. Security in Cloud CICD.mp4
    29:38
  • 3. Continuous Security Monitoring.mp4
    42:07
  • 4. Data Protection.mp4
    21:47
  • 5. Secrets Management.mp4
    48:20
    • 1. Securing Cloud Architecture
    • 1. Cloud Security Operations.mp4
      00:18
    • 2. Course Roadmap 1.mp4
      00:20
    • 3. Lab Environment Overview.mp4
      01:37
    • 4. Managing Containers Orchestrators.mp4
      02:37
    • 5. Managing Containers Orchestrator Platforms.mp4
      01:31
    • 6. Managing Containers Orchestrator Security Risks.mp4
      02:28
    • 7. Kubernetes Security.mp4
      01:30
    • 8. Kubernetes Security Guides.mp4
      01:01
    • 9. Kubernetes Security Tools.mp4
      00:54
    • 10. Azure DevOps Deployment Overview.mp4
      01:03
    • 11. Azure DevOps.mp4
      00:47
    • 12. Azure Kubernetes Service AKS.mp4
      01:03
    • 13. Azure Kubernetes Service Concepts.mp4
      02:53
    • 14. Azure Kubernetes Service CLI or Azure Cloud Shell.mp4
      01:20
    • 15. Azure Kubernetes Service Terraform 1.mp4
      00:33
    • 16. Azure Kubernetes Service Terraform 2.mp4
      00:27
    • 17. Azure Kubernetes Service Terraform 3.mp4
      00:29
    • 18. Azure Application Gateway.mp4
      01:16
    • 19. Azure Global High Availability.mp4
      00:39
    • 20. Course Roadmap 2.mp4
      00:06
    • 21. AWS Deployment Overview.mp4
      04:11
    • 22. Version Control Accessing CodeCommit Using SSH.mp4
      00:39
    • 23. CodePipeline Continuous Integration and Delivery.mp4
      01:12
    • 24. Define CodePipeline Stages.mp4
      01:53
    • 25. Viewing Deployment Progress.mp4
      00:54
    • 26. CodeBuild Overview.mp4
      00:17
    • 27. CodeBuild Phases.mp4
      02:55
    • 28. Security Considerations for CloudBased CICD.mp4
      01:36
    • 29. EC2 Container Service ECS Overview.mp4
      01:12
    • 30. ECS Clusters.mp4
      00:33
    • 31. AWS Elastic Load Balancing.mp4
      01:15
    • 32. Application Load Balancer.mp4
      01:08
    • 33. Dunder Mifflin Virtual Private Cloud with ECS.mp4
      00:14
    • 34. Cloud Security Misconfiguration.mp4
      01:48
    • 35. AWS S3 Bucket Warning Notice.mp4
      00:58
    • 36. Hunt the Bug Leaky Buckets.mp4
      01:03
    • 37. Service Roles to Limit Access.mp4
      00:54
    • 38. Hunt the Bug Instance Launch Configuration.mp4
      03:20
    • 39. Hunt the Bug Instance Launch Configuration Concerns.mp4
      00:07
    • 40. Hunt the Bug TLS Configuration.mp4
      00:26
    • 41. ELB Security Policies.mp4
      01:18
    • 42. Summary of AWS Security Issues.mp4
      00:19
    • 43. Lab 31 CloudFormation Security Review.mp4
      01:39
    • 44. Lab 31 Summary CloudFormation Security Review.mp4
      05:30
      2. Security in Cloud CICD
    • 1. Course Roadmap .mp4
      00:20
    • 2. Command Injection Review.mp4
      00:56
    • 3. SQL Injection Example.mp4
      02:41
    • 4. Hunt the Bug SQL Injection.mp4
      01:25
    • 5. Code Fix for SQL Injection.mp4
      00:14
    • 6. Checkpoint.mp4
      01:39
    • 7. Security Testing in CodePipeline.mp4
      00:16
    • 8. Security in CodePipeline SAST with CI Integration.mp4
      00:40
    • 9. Security in CodePipeline SAST with Lambda.mp4
      01:15
    • 10. Security in CodePipeline SAST with CodeBuild.mp4
      02:11
    • 11. Adding SAST to CodePipeline.mp4
      00:18
    • 12. Adding SAST to CodePipeline New CodeBuild Project.mp4
      00:15
    • 13. Adding SAST to CodePipeline Run on Container.mp4
      01:48
    • 14. Adding SAST to CodePipeline Find Security Bugs.mp4
      01:17
    • 15. Adding SAST to CodePipeline Test Stage.mp4
      01:09
    • 16. Extending SAST in CodePipeline.mp4
      00:29
    • 17. Extending SAST in CodePipeline Publish SAST Results.mp4
      00:51
    • 18. Extending SAST in CodePipeline Jenkins Setup.mp4
      01:08
    • 19. Extending SAST in CodePipeline Set Build Trigger.mp4
      00:23
    • 20. Extending SAST in CodePipeline Configure PostBuild.mp4
      00:21
    • 21. Penetration Testing and DAST Scanning in the Cloud.mp4
      02:37
    • 22. DAST Cloud Scanning Technical Considerations.mp4
      00:51
    • 23. Lab Prerequisite SSLTLS Warning.mp4
      00:36
    • 24. Lab 32 Code Analysis in CodePipeline.mp4
      00:18
    • 25. Lab 32 Code Analysis in CodePipeline Summary.mp4
      05:27
      3. Continuous Security Monitoring
    • 1. Course Roadmap .mp4
      00:14
    • 2. Security in CD Operations.mp4
      00:43
    • 3. Monitoring and Metrics in DevOps.mp4
      07:52
    • 4. Metrics Data Flow.mp4
      01:08
    • 5. Metrics Data Formats.mp4
      00:42
    • 6. Metrics Data Processing.mp4
      00:26
    • 7. CloudWatch.mp4
      00:47
    • 8. CloudWatch Log Insights.mp4
      01:44
    • 9. CloudWatch Metric Filter.mp4
      00:45
    • 10. CloudWatch Graphing a Metric.mp4
      00:18
    • 11. Monitoring and Metrics for DevSecOps.mp4
      01:33
    • 12. Infrastructure Discovery osquery and OSQL.mp4
      01:01
    • 13. osquery in Enterprise Environments.mp4
      00:34
    • 14. osquery Use Cases.mp4
      01:11
    • 15. Monitoring Anomaly Detection.mp4
      00:59
    • 16. Alerting Grafana Raising a Slack Alert.mp4
      01:12
    • 17. Production Monitoring at Etsy.mp4
      01:40
    • 18. AttackDriven Defense.mp4
      01:10
    • 19. Signal Sciences SaaS platform for Web Security Visibility.mp4
      01:46
    • 20. PostProduction Checks.mp4
      02:02
    • 21. Incident Response Game Days and Postmortems.mp4
      01:45
    • 22. Morgue Tool for Analyzing an Incident.mp4
      00:47
    • 23. Security War Games and Red Team Fire Drills.mp4
      00:58
    • 24. Case Study Continuous Red Team Fire Drills at Intuit.mp4
      02:09
    • 25. Lab 33 Monitor with Dashboards.mp4
      01:08
    • 26. Lab 33 Summary Monitor with Dashboards.mp4
      07:20
      4. Data Protection
    • 1. Course Roadmap 1.mp4
      00:43
    • 2. Azure Storage Security.mp4
      03:52
    • 3. Data Storage in AWS.mp4
      01:11
    • 4. Securing Data at Rest.mp4
      00:40
    • 5. ServerSide Encryption 1.mp4
      00:31
    • 6. ServerSide Encryption 2.mp4
      00:56
    • 7. ClientSide Encryption 1.mp4
      01:16
    • 8. ClientSide Encryption 2.mp4
      02:14
    • 9. Securing Data at Rest S3.mp4
      01:05
    • 10. S3 ServerSide Encryption Key Management.mp4
      01:06
    • 11. S3 ClientSide Encryption.mp4
      00:21
    • 12. Using ServerSide Encryption with S3 Upload File 1.mp4
      01:23
    • 13. S3 Default Encryption.mp4
      01:50
    • 14. Securing Data at Rest Relational Database Service RDS.mp4
      01:33
    • 15. RDS Encryption Caveats.mp4
      01:49
    • 16. Creating an Encrypted RDS Instance 1.mp4
      00:07
    • 17. Creating an Encrypted RDS Instance 2.mp4
      00:30
    • 18. Creating an Encrypted RDS Instance 3.mp4
      00:34
      5. Secrets Management
    • 1. Course Roadmap 1.mp4
      00:56
    • 2. What Are Secrets.mp4
      01:01
    • 3. How Not to Keep Secrets In Code.mp4
      02:05
    • 4. Be Especially Careful with GitHub.mp4
      02:21
    • 5. Preventing Secrets in Code.mp4
      00:38
    • 6. Handling Secrets in Configuration Management Tools.mp4
      00:46
    • 7. Secret Keepers.mp4
      00:47
    • 8. Secret Keepers OpenSource Solutions.mp4
      01:22
    • 9. Secret Keepers Commercial.mp4
      00:33
    • 10. Key Management.mp4
      00:15
    • 11. Course Roadmap 2.mp4
      00:05
    • 12. Azure Key Vault 1.mp4
      01:10
    • 13. Azure Key Vault 2.mp4
      00:51
    • 14. Azure Key Vault Storing Secrets.mp4
      00:54
    • 15. KMS Overview 1.mp4
      01:10
    • 16. KMS Overview 2.mp4
      00:50
    • 17. KMS Infrastructure.mp4
      00:53
    • 18. KMS Essential Concepts 1.mp4
      00:19
    • 19. KMS Essential Concepts 2.mp4
      02:48
    • 20. Using KMS.mp4
      00:18
    • 21. Key Policies.mp4
      00:38
    • 22. Creating a CMK CloudFormation Template.mp4
      02:00
    • 23. Direct KMS Encryption.mp4
      01:32
    • 24. KMS SDK.mp4
      01:09
    • 25. KMS and SelfManaged Master Keys.mp4
      02:02
    • 26. CloudHSM.mp4
      01:05
    • 27. Secrets Management.mp4
      00:13
    • 28. Simple Systems Manager SSM Parameter Store.mp4
      00:57
    • 29. Simple Systems Manager SSM Parameter Store Example.mp4
      01:00
    • 30. Parameter Store vs Secrets Manager.mp4
      01:48
    • 31. ThirdParty Solutions.mp4
      00:09
    • 32. Course Roadmap 3.mp4
      00:53
    • 33. Secret Keepers A Closer Look at HashiCorp Vault.mp4
      00:35
    • 34. Secret Keepers Vault Secrets Engines.mp4
      01:16
    • 35. Secret Keepers Using Vault.mp4
      03:03
    • 36. Secret Keepers Vault Configuration.mp4
      01:32
    • 37. Lab Secrets Setup.mp4
      01:33
    • 38. Lab 34 Secrets Management.mp4
      00:46
    • 39. Lab 34 Summary Secrets Management.mp4
      05:48
    • 40. Managing Secrets Summary.mp4
      00:01
    • 41. NetWars Bonus Challenges.mp4
      00:01
    • 42. Course Roadmap 4.mp4
      00:01
  • 1. Deployment Orchestration.mp4
    32:14
  • 2. Secure Content Delivery.mp4
    36:12
  • 3. Microservice Security.mp4
    01:07:35
  • 4. Serverless Security.mp4
    49:34
    • 1. Deployment Orchestration
    • 1. Cloud Security as a Service.mp4
      00:37
    • 2. Course Roadmap 1.mp4
      00:52
    • 3. Broken Access Control.mp4
      03:28
    • 4. Insecure Direct Object Reference Example.mp4
      00:59
    • 5. Hunt the Bug Broken Access Control.mp4
      02:11
    • 6. Code Fix for Broken Access Control.mp4
      01:13
    • 7. BlueGreen Deployment.mp4
      01:10
    • 8. BlueGreen Deployment Azure.mp4
      00:22
    • 9. BlueGreen Deployment Virtual Machines.mp4
      02:57
    • 10. Swapping the Traffic Manager Weight.mp4
      00:31
    • 11. BlueGreen Deployment AKS.mp4
      01:50
    • 12. BlueGreen Deployment AWS.mp4
      00:09
    • 13. EC2 Instances Update DNS.mp4
      01:57
    • 14. AWS Route 53 Weighted Routing.mp4
      01:37
    • 15. EC2 Instances Weighted Target Groups.mp4
      02:22
    • 16. Changing the Target Group Weighting.mp4
      00:44
    • 17. EC2 Container Service ECS Update DNS.mp4
      00:26
    • 18. EC2 Container Service ECS Swap ECS Service.mp4
      01:07
    • 19. Swapping the ECS Service.mp4
      00:27
    • 20. Factors in Evaluating BlueGreen Deploy Options.mp4
      01:14
    • 21. Lab 41 BlueGreen Deploy for Security.mp4
      02:22
    • 22. Lab 41 Summary BlueGreen Deploy for Security.mp4
      03:29
      2. Secure Content Delivery
    • 1. Course Roadmap 1.mp4
      00:09
    • 2. Content Delivery Network CDN.mp4
      01:54
    • 3. Content Delivery Issues.mp4
      01:16
    • 4. Azure CDN.mp4
      00:38
    • 5. Azure CDN Token Signing.mp4
      01:41
    • 6. CloudFront Origin Access Identity.mp4
      01:09
    • 7. Restricting Access to S3 Content.mp4
      01:21
    • 8. Securing Content with CloudFront.mp4
      00:27
    • 9. Using Signed URLs and Cookies.mp4
      01:12
    • 10. Creating a CloudFront Distribution.mp4
      01:50
    • 11. When to Use Signed URLs vs Signed Cookies.mp4
      02:34
    • 12. Canned vs Custom Policies.mp4
      01:13
    • 13. Using Signed URLs.mp4
      01:53
    • 14. Code to Create Signed URLs with a Custom Policy.mp4
      00:50
    • 15. Using Signed Cookies.mp4
      00:37
    • 16. Code to Create Signed Cookies with a Canned Policy.mp4
      00:18
    • 17. Broken Session Management.mp4
      02:11
    • 18. Same Origin Policy.mp4
      01:01
    • 19. CrossOrigin Resource Sharing CORS.mp4
      01:24
    • 20. Simple CORS Example.mp4
      03:51
    • 21. Preflight CORS Example.mp4
      01:35
    • 22. Hunt the Bug S3 CORS Configuration.mp4
      00:58
    • 23. Lab 42 CloudFront Content Protection.mp4
      02:05
    • 24. Lab 42 Summary CloudFront Content Protection.mp4
      03:54
      3. Microservice Security
    • 1. Course Roadmap 1.mp4
      01:14
    • 2. Monolith Architecture Attack Surface.mp4
      03:16
    • 3. Monolith Architecture Security Controls.mp4
      00:08
    • 4. Microservices.mp4
      02:32
    • 5. Microservice Architecture.mp4
      00:59
    • 6. Microservice Architecture Attack Surface.mp4
      02:04
    • 7. Microservices Complexity Netflixs Topology Example.mp4
      02:00
    • 8. Microservices TradeOffs.mp4
      03:34
    • 9. Microservices Security Challenges 1.mp4
      00:41
    • 10. Microservices Security Challenges 2.mp4
      03:21
    • 11. Microservice Security Controls.mp4
      00:11
    • 12. Microservice Security API Gateway.mp4
      00:50
    • 13. API Gateway ProsCons.mp4
      00:21
    • 14. Microservice API Gateway Architecture.mp4
      02:19
    • 15. MicroserviceCloud Authentication Options.mp4
      00:32
    • 16. Security Token Service STS.mp4
      00:39
    • 17. Security Token Service STS API Commands.mp4
      00:17
    • 18. STS API Gateway CloudFormation Role Example.mp4
      00:27
    • 19. Identity Federation.mp4
      00:21
    • 20. STS Enterprise Federation Example.mp4
      01:45
    • 21. Web Identity Federation.mp4
      00:34
    • 22. STS Web Identity Federation Example.mp4
      01:22
    • 23. Additional Authentication Providers.mp4
      01:34
    • 24. Microservice Security Authorization and Access Control.mp4
      03:08
    • 25. JWT Critical Vulnerability.mp4
      02:20
    • 26. JWT Security Best Practices.mp4
      09:49
    • 27. Microservice Security Service Mutual TLS Authentication.mp4
      03:21
    • 28. MicroserviceContainer PKI Deployment.mp4
      00:19
    • 29. Microservice Security Secure Coding.mp4
      00:43
    • 30. Course Roadmap 2.mp4
      00:05
    • 31. Azure API Management.mp4
      01:17
    • 32. AWS API Gateway.mp4
      01:22
    • 33. Creating the API Gateway.mp4
      00:21
    • 34. API Gateway Authentication and Authorization.mp4
      00:42
    • 35. Configuring the API Gateway Authorization Type.mp4
      00:56
    • 36. Configuring an API Gateway Custom Authorizer.mp4
      01:10
    • 37. API Gateway Client Certificate Authentication.mp4
      00:53
    • 38. Configuring API Deployment Logging Permissions.mp4
      00:37
    • 39. Hunt the Bug Method Settings.mp4
      00:19
    • 40. Lab Prerequisite Testing the API Gateway Endpoint.mp4
      00:41
    • 41. Lab Prerequisite Invoking the API Gateway Endpoint.mp4
      00:17
    • 42. Lab Prerequisite Invoking API Gateway with Postman.mp4
      00:21
    • 43. Example Postman Output.mp4
      00:58
    • 44. Lab 43 Using API Gateway.mp4
      00:17
    • 45. Lab 43 Summary Using API Gateway.mp4
      06:18
      4. Serverless Security
    • 1. Course Roadmap 1.mp4
      00:01
    • 2. What Is Serverless.mp4
      00:41
    • 3. Newer Meaning of Serverless.mp4
      01:30
    • 4. Serverless Benefits for DevOps Teams.mp4
      02:09
    • 5. Serverless Security Benefits.mp4
      03:20
    • 6. Serverless Security Concerns.mp4
      03:26
    • 7. Serverless Security Container Runtime Persistence.mp4
      04:42
    • 8. Serverless and Application Security.mp4
      01:36
    • 9. OWASP Serverless Security Resources.mp4
      01:49
    • 10. Serverless Security Best Practices.mp4
      02:27
    • 11. Serverless Security Use Cases.mp4
      02:09
    • 12. Azure Functions Serverless.mp4
      01:21
    • 13. Azure Functions Serverless Security Features.mp4
      01:50
    • 14. AWS Lambda.mp4
      00:54
    • 15. Lambda Programming Model.mp4
      01:04
    • 16. Lambda Security Model.mp4
      00:34
    • 17. Lambda Logging and Auditing.mp4
      00:12
    • 18. AWS Lambda Layers.mp4
      02:21
    • 19. Lambda Layers Security.mp4
      01:13
    • 20. PureSec FunctionShield.mp4
      02:43
    • 21. PureSec FunctionShield Nodejs Example.mp4
      01:08
    • 22. Hunt the Bug Creating a Lambda Function.mp4
      03:59
    • 23. Hunt the Bug Lambda Function Concerns.mp4
      00:05
    • 24. Hunt the Bug Lambda Execution Role.mp4
      00:11
    • 25. Lab Prerequisite Reviewing Function Code.mp4
      00:49
    • 26. Lab 44 Serverless Security.mp4
      00:08
    • 27. Lab 44 Summary Serverless Security.mp4
      06:56
    • 28. NetWars Bonus Challenges.mp4
      00:01
    • 29. Course Roadmap 2.mp4
      00:01
  • 1. Runtime Security Automation.mp4
    49:13
  • 2. Continuous Auditing.mp4
    48:10
  • 3. Cloud Security Monitoring.mp4
    38:45
  • 4. Lab 54 Environment Tear Down.mp4
    03:13
  • 5. Summary.mp4
    03:58
  • 6. Bonus Challenges and Additional Resources.mp4
    00:39
    • 1. Runtime Security Automation
    • 1. Compliance as Code.mp4
      00:34
    • 2. Course Roadmap.mp4
      00:26
    • 3. CrossSite Scripting XSS Review.mp4
      01:24
    • 4. XSS Example.mp4
      06:07
    • 5. Hunt the Bug XSS.mp4
      01:10
    • 6. Code Fix for XSS.mp4
      01:02
    • 7. CrossSite Request Forgery CSRF Review.mp4
      00:18
    • 8. Fixing CSRF.mp4
      00:11
    • 9. OWASP A10 Insufficient Logging Monitoring.mp4
      00:32
    • 10. Azure Front Door WAF.mp4
      03:44
    • 11. Azure Application Gateway and Web Application Firewall.mp4
      00:18
    • 12. AWS WAF Overview.mp4
      00:46
    • 13. XSS Rule Example.mp4
      00:31
    • 14. AWS WAF Security Automations.mp4
      01:34
    • 15. AWS WAF Security Automations Architecture.mp4
      05:37
    • 16. Creating a Match Condition CSRF.mp4
      03:56
    • 17. AWS WAF Matching Conditions.mp4
      00:39
    • 18. Text Transformations.mp4
      00:48
    • 19. Creating a WAF Rule CSRF.mp4
      01:58
    • 20. Creating a WAF WebAcl CSRF.mp4
      00:39
    • 21. WebAcl Example.mp4
      00:44
    • 22. Interactive Application Security Testing IAST.mp4
      02:23
    • 23. Runtime Application SecuritySelf Protection RASP.mp4
      01:55
    • 24. RASP and IAST Solutions.mp4
      01:52
    • 25. Comparing RASP to WAFs.mp4
      01:12
    • 26. Lab 51 Blocking Attacks with WAF.mp4
      00:49
    • 27. Lab 51 Summary Blocking Attacks with WAF.mp4
      07:49
      2. Continuous Auditing
    • 1. Course Roadmap.mp4
      00:15
    • 2. DevOps and Compliance.mp4
      02:49
    • 3. DevOps Audit Defense Toolkit.mp4
      02:11
    • 4. DevOps Audit Defense Toolkit Policy Definition.mp4
      02:23
    • 5. DevOps Audit Defense Toolkit Change Control.mp4
      01:35
    • 6. DevOps Audit Defense Toolkit Peer Reviews.mp4
      01:46
    • 7. DevOps Audit Defense Toolkit Infrastructure as Code.mp4
      00:51
    • 7. DevOps Audit Defense Toolkit Infrastructure as Code (1).mp4
      00:51
    • 7. DevOps Audit Defense Toolkit Infrastructure as Code (2).mp4
      00:51
    • 8. DevOps Audit Defense Toolkit Traceability.mp4
      00:37
    • 9. DevOps Audit Defense Toolkit Separation of Duties.mp4
      03:56
    • 10. DevOps Audit Defense Toolkit How to Use It.mp4
      00:15
    • 11. PCI DSS and DevOps Example.mp4
      01:38
    • 12. DevOps Continuous Delivery and ITIL.mp4
      01:06
    • 13. Implementing the CIS Controls in DevOps 1.mp4
      01:51
    • 14. Implementing the CIS Controls in DevOps 2.mp4
      01:12
    • 15. Automating Complian ce Checking InSpec.mp4
      01:22
    • 16. Automating Compliance Checking Chef Automate.mp4
      01:27
    • 17. CIS Azure Foundation Benchmarks.mp4
      00:45
    • 18. CIS Azure Benchmarks InSpec Azure Resource Pack.mp4
      01:25
    • 19. CIS AWS Foundation Benchmarks.mp4
      00:23
    • 20. AWS Security Benchmark Project.mp4
      01:58
    • 21. AWS Security Benchmark Commands.mp4
      01:31
    • 22. AWS Auditing Roadmap.mp4
      00:48
    • 23. AWS Trusted Advisor.mp4
      01:34
    • 24. AWS Config.mp4
      01:35
    • 25. CloudMapper.mp4
      03:13
    • 26. Lab 52 CloudMapper Continuous Audit.mp4
      01:26
    • 27. Lab 52 Summary CloudMapper Continuous Audit.mp4
      05:50
    • 28. DevOps and Compliance Summary.mp4
      00:30
      3. Cloud Security Monitoring
    • 1. Course Roadmap.mp4
      00:08
    • 2. Security Monitoring.mp4
      00:21
    • 3. Azure Security Center.mp4
      02:37
    • 4. Azure Vulnerability Assessment.mp4
      02:25
    • 5. Microsoft Security Risk Detection.mp4
      02:08
    • 6. Azure Log Analytics.mp4
      01:46
    • 7. AWS Security Hub.mp4
      02:40
    • 8. AWS Security Monitoring Logging.mp4
      00:47
    • 9. CloudTrail.mp4
      03:23
    • 10. Centrally Configure CloudTrail.mp4
      01:20
    • 11. VPC Flow Logs.mp4
      01:13
    • 12. VPC Flow Log CLI Example.mp4
      00:59
    • 13. VPC Flow Log CloudFormation Example.mp4
      00:21
    • 14. CloudFront and S3 Server Access Logs.mp4
      00:58
    • 15. Application Load Balancer Access Logs.mp4
      00:34
    • 16. AWS GuardDuty.mp4
      00:21
    • 17. AWS GuardDuty Threat Detections.mp4
      00:32
    • 18. CloudWatch Events.mp4
      00:40
    • 19. Monitoring Architecture.mp4
      01:49
    • 20. AWS Monitoring Roadmap.mp4
      00:32
    • 21. ThirdParty Security Monitoring.mp4
      00:32
    • 22. Cloud Custodian.mp4
      02:24
    • 23. Cloud Custodian Policy File.mp4
      01:34
    • 24. Cloud Custodian Remediation Workflow.mp4
      00:28
    • 25. Cloud Custodian CloudTrail Log.mp4
      00:38
    • 26. Cloud Custodian CloudWatch Event Rule.mp4
      00:27
    • 27. Cloud Custodian CloudWatch Event Log.mp4
      01:15
    • 28. Cloud Custodian CloudWatch Event Target.mp4
      00:17
    • 29. Cloud Custodian Lambda Function.mp4
      01:08
    • 30. Lab 53 Cloud Custodian Remediation.mp4
      00:01
    • 31. Lab 53 Summary Cloud Custodian Remediation.mp4
      04:14
      4. Lab 54 Environment Tear Down
    • 1. Course Roadmap.mp4
      00:13
    • 2. Lab 54 Environment Tear Down.mp4
      03:00
      5. Summary
    • 1. Course Roadmap.mp4
      00:09
    • 2. Security Changes with DevOps and Cloud Use CD.mp4
      01:17
    • 3. Security Changes with DevOps and Cloud Embrace Change.mp4
      00:54
    • 4. Security Changes with DevOps and Cloud Changing Culture.mp4
      00:43
    • 5. Security Cannot Be a Blocker.mp4
      00:15
    • 6. Inject Security Into the CICD Pipeline.mp4
      00:34
    • 7. Quick Wins Checklist 1.mp4
      00:01
    • 8. Quick Wins Checklist 2.mp4
      00:01
    • 9. Building LongTerm Gains Checklist.mp4
      00:01
      6. Bonus Challenges and Additional Resources
    • 1. NetWars Bonus Challenges.mp4
      00:01
    • 2. Course Roadmap.mp4
      00:01
    • 3. SANS DevSecOps Curriculum.mp4
      00:01
    • 4. DevOpsSec.mp4
      00:01
    • 5. For More Information on DevOps 1.mp4
      00:01
    • 6. For More Information on DevOps 2.mp4
      00:01
    • 7. DevOps Conferences.mp4
      00:01
    • 8. Continuous Delivery and Deployment.mp4
      00:01
    • 9. Infrastructure as Code.mp4
      00:01
    • 10. DevOps Security Tools.mp4
      00:01
    • 11. Container Security.mp4
      00:01
    • 12. Cloud Security.mp4
      00:01
    • 13. Authors and Contributors.mp4
      00:01
    • 14. COURSE RESOURCES AND CONTACT INFORMATION.mp4
      00:22

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing.
    • language english
    • Training sessions 751
    • duration 33:14:07
    • Release Date 2023/07/03

    Courses related to DevOps

    Courses related to CISSP - Certified Information Systems Security Professional

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security

    Courses related to Cyber Security Awareness

    Courses related to Cloud Computing