DevSecOps: Building a Secure Continuous Delivery Pipeline

DevSecOps: Building a Secure Continuous Delivery Pipeline

.MP4, AVC, 256 kbps, 1280x720 | English, AAC, 128 kbps, 2 Ch | 1h 12m | 147 MB

Instructor: James Wickett
Over the past several years, information security has struggled to keep up with the fast-paced DevOps movement. DevSecOps-an extension of DevOps-aims to remedy this by embracing security as an essential part of DevOps culture. This course examines this fresh take on DevOps, providing an overview of the practices and tools that can help you implement security across the entirety of the continuous integration and continuous delivery (CI/CD) pipeline. As instructor James Wickett looks at CI/CD through the lens of security, he breaks up the pipeline into five distinct stages: develop, inherit, build, deploy, and operate. As he moves through each of these stages, he provides an overview of best practices and tools that can fit nicely into your DevSecOps toolchain approach.

Topics include:

Goals for a DevSecOps toolchain approach
Development, inherit, build, deploy, and operation tools
Keeping secrets with git-secrets
Using OWASP Dependency Check
Testing for dependency issues using Retire.js
Options for software composition analysis
Key security concerns for the deploy phase
Tricks for making compliance happy
Cloud configuration monitorin

Download:

http://longfiles.com/v2g5dfxoa29a/DevSecOps_Building_a_Secure_Continuous_Delivery_Pipeline.rar.html

[Fast Download] DevSecOps: Building a Secure Continuous Delivery Pipeline


Ebooks related to "DevSecOps: Building a Secure Continuous Delivery Pipeline" :
CISM Cert Prep: 2 Information Risk Management
Principles of Secure Processor Architecture Design
Securing Web Applications
Architecting Cloud Computing Solutions: Build cloud strategies that align technology and economics w
VMware NSX Cookbook: Over 70 recipes to master the network virtualization skills to implement, valid
Computer Viruses For Dummies
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Conce
Tutorials on the Foundations of Cryptography
The Art of Software Security Testing: Identifying Software Security Flaws
Enterprise Level Security: Securing Information Systems in an Uncertain World
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
ads300
histats code