وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

DevSecOps Bootcamp

سرفصل های دوره

0 - Getting Started with the DevSecOps Bootcamp
  • 1 - Why learn DevSecOps
  • 2 - Pre-Requisites of Bootcamp
  • 3 - DevSecOps Bootcamp Curriculum Overview
  • 4 - Support and Other Bootcamp Materials
  • 5 - Certified DevSecOps Practitioner - Applying for Digital Badge

  • 1 - Security Essentials
  • 1 - Introduction to Security (1 - Security Essentials)
  • 2 - Importance of Security & Impact of Security Breaches
  • 3 - How to Secure Systems Against Attacks
  • 4 - Types of Security Attacks - Part 1
  • 5 - Types of Security Attacks - Part 2
  • 6 - OWASP top 10 - Part 1
  • 7 - OWASP top 10 - Part 2
  • 8 - Security in Layers

  • 2 - Introduction to DevSecOps
  • 1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps)
  • 2 - Understand DevSecOps
  • 3 - Roles & Responsibilities in DevSecOps

  • 3 - Application Vulnerability Scanning
  • 1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning)
  • 2 - Impact of Missing Security Insights
  • 3 - Secret Scanning with GitLeaks - Local Environment
  • 4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline
  • 5 - False Positives & Fixing Security Vulnerabilities
  • 6 - Integrate SAST Scans in Release Pipeline

  • 4 - Vulnerability Management and Remediation
  • 1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation)
  • 2 - Introduction to DefectDojo, Managing Security Findings, CWEs
  • 3 - Automate Uploading Security Scan Results to DefectDojo
  • 4 - Fix Security Issues Discovered in the DevSecOps Pipeline

  • 5 - Vulnerability Scanning for Application Dependencies
  • 1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies)
  • 2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs
  • 3 - Overview of Static Security Scans in CI Pipeline

  • 6 - Build a CD Pipeline
  • 1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline)
  • 2 - Introduction to Security Layers for AWS Access
  • 3 - Integrate CICD Pipeline with AWS ECR
  • 4 - Configure Application Deployment Environment on EC2 Server
  • 5 - Deploy Application to EC2 Server with Release Pipeline
  • 6 - Configure Self-Managed GitLab Runner for Pipeline Jobs
  • 7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching

  • 7 - Image Scanning - Build Secure Docker Images
  • 1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images)
  • 2 - Configure Automated Security Scanning in Application Image
  • 3 - Analyze & Fix Security Issues from Findings in Application Image
  • 4 - Automate Uploading Image Scanning Results in DefectDojo
  • 5 - Docker Security Best Practices
  • 6 - Configure Automated Image Security Scanning in ECR Image Repository
  • 7 - Overview of Automated Application Code and Image Scanning Steps

  • 8 - AWS Cloud Security & Access Management
  • 1 - AWS Security Essentials (8 - AWS Cloud Security & Access Management)
  • 2 - Understand AWS Access Management using IAM Service
  • 3 - Securing AWS Root User Account
  • 4 - IAM Users, Groups & Policies
  • 5 - Secure Access from CICD Pipeline to AWS
  • 6 - Understand Importance of IAM Roles in AWS Cloud Security
  • 7 - Overview of IAM Resources & Secure Access Management in AWS

  • 9 - Secure Continuous Deployment & DAST
  • 1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deployment & DAST)
  • 2 - Configure AWS Systems Manager for EC2 Server
  • 3 - AWS SSM Commands in Release Pipeline for Server Access
  • 4 - Secure Continuous Deployment to Server using SSM
  • 5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials
  • 6 - Overview of AWS Security Measures and Continuous Security Improvements
  • 7 - Understand Dynamic Application Security Testing (DAST)
  • 8 - Configure Automated DAST Scans in CICD Pipeline
  • 9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans

  • 10 - IaC and GitOps for DevSecOps
  • 1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps)
  • 2 - Terraform Script for AWS Infrastructure Provisioning
  • 3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources
  • 4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles
  • 5 - Configure Remote State for Terraform
  • 6 - Add Automated Security Scan to TF Infrastructure Code
  • 7 - Understand IaC Concept Cattle vs Pets

  • 11 - Logging & Monitoring for Security
  • 1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security)
  • 2 - Introduction to CloudTrail and CloudWatch
  • 3 - CloudTrail Event History
  • 4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch
  • 5 - Create CloudWatch Alarm for EC2 Instance
  • 6 - Create Custom Metric Filter for Failed Login Metrics
  • 7 - Configure Alarm for Failed Login Attempts
  • 8 - Configure AWS Budgets for Monthly Usage Costs
  • 9 - Complete Bootcamp Part 1 - Next Steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 28208
    حجم: 3147 مگابایت
    مدت زمان: 859 دقیقه
    تاریخ انتشار: 20 دی 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید