DevOps: Configuration Management, CI/CD, Monitoring-Security
DevOps: Configuration Management, CI/CD, Monitoring-Security, available at $44.99, has an average rating of 4.3, with 49 lectures, 2 quizzes, based on 32 reviews, and has 376 subscribers.
You will learn about Implement DevOps using a Docker container Explore continuous integration tools and different configuration management tools. Explore Container orchestration with best practices and implement security solutions in the DevOps cycle. Integrate Security into Continuous Delivery workflows for continuous security. Leverage Infrastructure as Code techniques for secure configuration management and provisioning. Eliminate manual security practices such as risk assessments and audits by automating all the verification. Build a better defense mechanism by the use of Red and Blue teams. Create automatic compliance by using the DevOps Audit Defense Toolkit. Build continuous a feedback loop by automating all security checks throughout the Continuous Delivery pipeline. This course is ideal for individuals who are System Administrators, Solution Architects, DevOps Engineers, Security Consultant, Cloud Security Strategists who want to understand the concept of building a DevOps strategy from scratch and are looking to use the principles of DevOps to secure their software in a continuous and iterative manner! It is particularly useful for System Administrators, Solution Architects, DevOps Engineers, Security Consultant, Cloud Security Strategists who want to understand the concept of building a DevOps strategy from scratch and are looking to use the principles of DevOps to secure their software in a continuous and iterative manner!.
Enroll now: DevOps: Configuration Management, CI/CD, Monitoring-Security
Summary
Title: DevOps: Configuration Management, CI/CD, Monitoring-Security
Price: $44.99
Average Rating: 4.3
Number of Lectures: 49
Number of Quizzes: 2
Number of Published Lectures: 49
Number of Published Quizzes: 2
Number of Curriculum Items: 51
Number of Published Curriculum Objects: 51
Original Price: $199.99
Quality Status: approved
Status: Live
What You Will Learn
- Implement DevOps using a Docker container
- Explore continuous integration tools and different configuration management tools.
- Explore Container orchestration with best practices and implement security solutions in the DevOps cycle.
- Integrate Security into Continuous Delivery workflows for continuous security.
- Leverage Infrastructure as Code techniques for secure configuration management and provisioning.
- Eliminate manual security practices such as risk assessments and audits by automating all the verification.
- Build a better defense mechanism by the use of Red and Blue teams.
- Create automatic compliance by using the DevOps Audit Defense Toolkit.
- Build continuous a feedback loop by automating all security checks throughout the Continuous Delivery pipeline.
Who Should Attend
- System Administrators, Solution Architects, DevOps Engineers, Security Consultant, Cloud Security Strategists who want to understand the concept of building a DevOps strategy from scratch and are looking to use the principles of DevOps to secure their software in a continuous and iterative manner!
Target Audiences
- System Administrators, Solution Architects, DevOps Engineers, Security Consultant, Cloud Security Strategists who want to understand the concept of building a DevOps strategy from scratch and are looking to use the principles of DevOps to secure their software in a continuous and iterative manner!
If continuous security in development lifecycle like configuration checks, code analysis, vulnerability scanning etc. is not adequately automated then it leads to increased security violations and hacking/phishing attacks. DevOps enables rapid application development and follows a traditional way of performing security checks. It helps an organization deploy software while maintaining service stability. If you’re looking to protect your organization with the collaboration of DevOps and security then is the perfect Course for you!
This comprehensive 2-in-1 course takes a step-by-step practical approach to protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework. You’ll initially implement a complete DevOps cycle with use cases as well as implement DevOps using a Docker container. You’ll explore continuous integration tools and different configuration management tools using Chef, puppet, and Ansible. Moving further, you’ll create automatic compliance by using the DevOps Audit Defense Toolkit. Finally, you’ll build a continuous feedback loop by automating all security checks throughout the Continuous Delivery pipeline.
Towards the end of this course, you’ll protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework.
Contents and Overview
This training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible.
The first course, Professional DevOps, covers DevOps tools and technology frameworks to implement DevOps for your organization. This course helps you implement a complete DevOps cycle in your existing IT environment. Each section of this course will help you implement the DevOps culture in your professional environment. With the help of source control, continuous build, continuous integration, automated test with quality controls, and container technologies, this course will be your perfect guide to learn and apply DevOps in your organization. By the end of this course, you’ll be able to identify and choose the appropriate tools and technology framework to implement DevOps in your organization.
The second course, Practical DevOps Security,covers protecting your organization with the collaboration of DevOps and security. This course shows you how to apply DevOps security best practices at every stage in your DevOps pipeline. You will learn proven approaches to reducing vulnerability and strengthening your defenses against attack. You will understand using security as code with the intent of making security and compliance consumable as a service. This course explains how DevOps security practices differ from traditional security approaches and provide techniques to embed governance and cybersecurity functions throughout the DevOps workflow. By the end of the course, you will have learned best practices in DevSecOps, the core concepts of secure DevOps, and how security can be integrated into the development pipeline.
Towards the end of this course, you’ll protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework.
About the Authors
● Umar Murtazahas more than 25 years’ experience of System Administration in implementing, commissioning development, testing, and production environments. He has designed and implemented a number of DevOps environments, conducted 4- day hands-on DevOps training sessions at a number of private and government telecommunications and software companies/institutions.
● Gurpreet Sachdevais a Technology Executive with 21+ years’ experience working on some of the most challenging technologies related to Cloud Computing, DevOps, and Security. Gurpreet did his B. Tech (C.S.) from NIT, Kurukshetra, and M.S. (Software Systems) from BITS, Pilani. He is currently working as Assistant Vice President—Technology with Aricent, Gurgaon. He is a keen Java enthusiast and co-founder of Delhi – NCR – Java User Group. Gurpreet is an invited speaker in prestigious conferences such as Oracle – Java One, Great India Developer Summit.
Course Curriculum
Chapter 1: Professional DevOps
Lecture 1: The Course Overview
Lecture 2: What Is DevOps? What Needs to be Done to Excel at DevOps?
Lecture 3: New DevOps Roles
Lecture 4: Continuous Integration, Configuration Management, and Continuous Delivery
Lecture 5: Continuous Monitoring, Testing, and Deployment
Lecture 6: Software Configuration Management Tools (Git)
Lecture 7: Vagrant – Lightweight, Reproducible, and Portable Development Environments
Lecture 8: The Role of Docker in the DevOps Cycle
Lecture 9: Docker Networking
Lecture 10: Docker Deep Dive with Use Cases
Lecture 11: Configuration Management Tools with Chef, Puppet, and Ansible
Lecture 12: Ansible – Provisioning, Configuration Management, and Application Deployment Too
Lecture 13: Jenkins – Continuous Integration and Continuous Delivery
Lecture 14: Configuring Jenkins with Git
Lecture 15: Kubernetes – Managing Containerized Workloads and Services
Lecture 16: DevOps Monitoring Solutions Using Monit and Nagios
Lecture 17: Set Up and Configure Nagios
Lecture 18: Infrastructure Monitoring Using Nagios
Lecture 19: Best Practices in DevOps Lifecycle
Lecture 20: Security Best Practices in DevOps
Lecture 21: Tool for Security Checks in Each Cycle of DevOps
Chapter 2: Practical DevOps Security
Lecture 1: The Course Overview
Lecture 2: Integrate Security for a DevOps World
Lecture 3: Risk Management in a Rapidly Changing World
Lecture 4: Key Principles and Benefits of Secure DevOps
Lecture 5: Business-Driven Security Strategies
Lecture 6: OWASP Security Guidelines
Lecture 7: Integrating Security Into CI/CD Pipeline
Lecture 8: Automated Security Testing
Lecture 9: Tools of the Trade
Lecture 10: Red and Blue Teams
Lecture 11: Security Requirements
Lecture 12: Architectural Considerations
Lecture 13: Threat Modeling, Data Flow Diagrams, and Attack Surface
Lecture 14: Identity and Access Management
Lecture 15: Code Inspection
Lecture 16: Environment Hardening
Lecture 17: What Is Static Application Security Testing?
Lecture 18: Embed SAST into the CI/CD Pipeline
Lecture 19: What Is Dynamic Application Security Testing?
Lecture 20: Embed DAST Into the Pipeline
Lecture 21: Runtime Application Self-Protection (RASP) versus Interactive Application Securi
Lecture 22: Software Composition Analysis
Lecture 23: Infrastructure as Code
Lecture 24: Key Management and Identity Management
Lecture 25: Chaos Monkey and Fuzz Testing
Lecture 26: Security Monitoring
Lecture 27: Governance, Risk, Compliance and Audit
Lecture 28: Incident Response and Forensics
Instructors
-
Packt Publishing
Tech Knowledge in Motion
Rating Distribution
- 1 stars: 1 votes
- 2 stars: 1 votes
- 3 stars: 4 votes
- 4 stars: 13 votes
- 5 stars: 13 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024