DevOps Security Considerations: Securing DevOps Pipeline
DevOps
| Intermediate
- 11 Videos | 54m 55s
- Includes Assessment
- Earns a Badge
In this 11-video course, learners can explore policy requirements and guidelines setting implementation standards for security requirements specified in the baseline IT security policy, and the role, approaches, and tools needed to implement and apply security in DevOps. Other key topics covered here include essential components for building logging and auditing pipelines; steps involved in implementing mature DevOps security model; and demonstrating how to control and manage permissions granted to user in GitHub (a Git repository hosting company) and Docker Hub. You will learn essential security features of Jenkins that will secure continuous build pipelines, along with the role of security in DevOps workflow, for continuous integration and continuous development (CI/CD) implementation. Next, learn how to implement continuous security in DevOps pipelines. You will explore the need for test-driven security in applications, infrastructure and automated DevOps pipelines, along with components used to build logging and auditing pipelines. Finally, discover how to control permissions in GitHub and how to manage permissions in Docker Hub, along with the security features of Jenkins.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe policy requirements and the guidelines that set the implementation standard for the security requirements specified in the baseline IT security policyrecognize the role of security in DevOps when building and developing the DevOps workflow to implement CI/CD processesdescribe the implementation of continuous security in DevOps pipelines, with a focus on test-driven development, monitoring, responding to attacks, assessing risks, and maturing securityrecognize the need for applying test-driven security on applications, infrastructure, and automated DevOps pipelinesdescribe components that can be used to build logging and auditing pipelines
-
recall the tools and processes that can be used to apply security for DevOps-compliant processes in order to manage intrusion and incident responsescontrol permissions granted to users in GitHub and manage permissions in Docker Hubconfigure Jenkins security features to secure continuous build pipelinesrecognize the steps involved in implementing mature a DevOps security model that can help assess risks and facilitate continuous securitysummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview2m 28sUP NEXT
-
2.Security Requirements and Security Policies10m 44s
-
3.Securing the DevOps Workflow4m 31s
-
4.Continuous Security5m 47s
-
5.DevOps Security Approaches6m 29s
-
6.Logging and Auditing Pipelines3m 39s
-
7.Tools and Processes for Securing DevOps6m 4s
-
8.GitHub and Docker Hub Security2m 56s
-
9.Securing Pipelines with Jenkins4m 16s
-
10.Security Model and Risk Assessment6m 30s
-
11.Course Summary1m 32s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.