DevOps Security Considerations: DevSecOps Principles

DevOps    |    Intermediate
  • 11 videos | 56m 25s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 761 users Rating 4.4 of 761 users (761)
Explore core concepts, benefits, and different phases of DevSecOps in this 11-video course, which compares DevOps with DevSecOps. In this course, learners will explore the prominent DevSecOps tools that are used to integrate security throughout the DevOps pipeline and illustrate the DevSecOps maturity model. Watch demonstrations of how to integrate security and testing into DevSecOps environment. Learn how to secure Jenkins secrets to store and manage credentials; to use Jenkins OAuth plugin to securely pull from GitHub (a Git repository hosting company); and to use pen test tool to conduct penetration testing on deployed applications. Explore the prominent categories of tools provided by OWASP (Open Web Application Security Project) to secure applications. OWASP comes with Top 10 Issue Ruleset, and provides proper guidelines to ensure that those issues are taken care of when applications are written. Other key topics include Jenkins credentials, Static Application Security Testing (SAST), and Dynamic Application Security Testing (DAST).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Compare devops and devsecops and describe the benefits of adopting the devsecops paradigm
    List the essential phases of the devsecops workflow and describe the critical checklists that can help secure devops implementations
    Describe devsecops tools that are used by development teams to integrate security throughout the devops pipeline
    Describe the devsecops maturity model and the dimensions that can help automate security checks
    Describe how security and testing can be integrated into a devsecops environment without compromising speed, security, or quality
  • Use the jenkins oauth plugin to securely pull from github
    Recall best practices for securing jenkins secrets to store and manage credentials
    List the categories of tools provided by owasp to secure applications
    Use penetration testing tools to conduct penetration testing on deployed application to identify vulnerabilities
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 8s
  • 3m 40s
    In this video, you will learn how to compare DevOps and DevSecOps and describe the benefits of adopting the DevSecOps paradigm. FREE ACCESS
  • Locked
    3.  Phases of the DevSecOps Workflow
    12m 52s
    After completing this video, you will be able to list the essential phases of the DevSecOps workflow and describe the critical checklists that can help secure DevOps implementations. FREE ACCESS
  • Locked
    4.  DevSecOps Tools
    7m 34s
    Upon completion of this video, you will be able to describe DevSecOps tools that are used by development teams to integrate security throughout the DevOps pipeline. FREE ACCESS
  • Locked
    5.  DevSecOps Maturity Model
    7m 20s
    After completing this video, you will be able to describe the DevSecOps Maturity Model and the dimensions that can help automate security checks. FREE ACCESS
  • Locked
    6.  DevSecOps Best Practices
    5m 24s
    Upon completion of this video, you will be able to describe how security and testing can be integrated into a DevSecOps environment without compromising speed, security, or quality. FREE ACCESS
  • Locked
    7.  Jenkins OAuth
    5m 4s
    In this video, find out how to use the Jenkins OAuth plugin to securely pull from a GitHub repository. FREE ACCESS
  • Locked
    8.  Managing Jenkins Credentials
    3m 26s
    After completing this video, you will be able to recall best practices for securing Jenkins Secrets and storing and managing credentials. FREE ACCESS
  • Locked
    9.  OWASP Tools
    6m 16s
    Upon completion of this video, you will be able to list the categories of tools provided by OWASP to secure applications. FREE ACCESS
  • Locked
    10.  Penetration Testing
    2m 4s
    In this video, find out how to use penetration testing tools to conduct penetration testing on deployed applications to identify vulnerabilities. FREE ACCESS
  • Locked
    11.  Course Summary
    1m 38s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 45 users Rating 4.6 of 45 users (45)
Rating 4.5 of 139 users Rating 4.5 of 139 users (139)
Rating 4.5 of 45 users Rating 4.5 of 45 users (45)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 248 users Rating 4.5 of 248 users (248)
Rating 4.3 of 9 users Rating 4.3 of 9 users (9)
Rating 4.3 of 185 users Rating 4.3 of 185 users (185)