DevOps Security Considerations: Securing DevOps Pipeline

DevOps
  • 11 Videos | 59m 25s
  • Includes Assessment
  • Earns a Badge
Likes 30 Likes 30
In this 11-video course, learners can explore policy requirements and guidelines setting implementation standards for security requirements specified in the baseline IT security policy, and the role, approaches, and tools needed to implement and apply security in DevOps. Other key topics covered here include essential components for building logging and auditing pipelines; steps involved in implementing mature DevOps security model; and demonstrating how to control and manage permissions granted to user in GitHub (a Git repository hosting company) and Docker Hub. You will learn essential security features of Jenkins that will secure continuous build pipelines, along with the role of security in DevOps workflow, for continuous integration and continuous development (CI/CD) implementation. Next, learn how to implement continuous security in DevOps pipelines. You will explore the need for test-driven security in applications, infrastructure and automated DevOps pipelines, along with components used to build logging and auditing pipelines. Finally, discover how to control permissions in GitHub and how to manage permissions in Docker Hub, along with the security features of Jenkins.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe policy requirements and the guidelines that set the implementation standard for the security requirements specified in the baseline IT security policy
    recognize the role of security in DevOps when building and developing the DevOps workflow to implement CI/CD processes
    describe the implementation of continuous security in DevOps pipelines, with a focus on test-driven development, monitoring, responding to attacks, assessing risks, and maturing security
    recognize the need for applying test-driven security on applications, infrastructure, and automated DevOps pipelines
    describe components that can be used to build logging and auditing pipelines
  • recall the tools and processes that can be used to apply security for DevOps-compliant processes in order to manage intrusion and incident responses
    control permissions granted to users in GitHub and manage permissions in Docker Hub
    configure Jenkins security features to secure continuous build pipelines
    recognize the steps involved in implementing mature a DevOps security model that can help assess risks and facilitate continuous security
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    2m 28s
    UP NEXT
  • Playable
    2. 
    Security Requirements and Security Policies
    10m 44s
  • Locked
    3. 
    Securing the DevOps Workflow
    4m 31s
  • Locked
    4. 
    Continuous Security
    5m 47s
  • Locked
    5. 
    DevOps Security Approaches
    6m 29s
  • Locked
    6. 
    Logging and Auditing Pipelines
    3m 39s
  • Locked
    7. 
    Tools and Processes for Securing DevOps
    6m 4s
  • Locked
    8. 
    GitHub and Docker Hub Security
    2m 56s
  • Locked
    9. 
    Securing Pipelines with Jenkins
    4m 16s
  • Locked
    10. 
    Security Model and Risk Assessment
    6m 30s
  • Locked
    11. 
    Course Summary
    1m 32s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 9 Likes 9  
Likes 0 Likes 0  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE