DevSecOps and Containers

DevSecOps    |    Intermediate
  • 13 videos | 1h 8m 28s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Containers are units of software that package code and its dependencies to ensure applications run quickly and reliably across environments. In this course, you will explore the key differences between virtualization and containerization and the key benefits provided by both. Then you will differentiate between Kubernetes and Docker container solutions and find out why more teams are adopting containers. Next, you will examine how containers make DevSecOps. You will investigate common security challenges presented by containers, such as attack surface size, and you will learn how features such as application programming interface (API) microgateways can be used to complement programming language frameworks to help secure development practices. Then you will focus on how Cloud Native Buildpacks (CNB) and Paketo can be used to build modular container images that can help transform source code using modular, reusable build functions. Finally, you will learn how a strong culture can help provide top-tier container security.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Differentiate between virtualization and containerization and outline key benefits provided by both
    Differentiate between kubernetes and docker container orchestration systems
    Outline reasons why teams are adopting containers
    Describe how containers make it easier to do devsecops
    Provide an overview of common security challenges presented by containers, such as attack surface size
    Describe how api microgateways can complement programming language frameworks to help secure development practices
  • Describe how cloud native buildpacks (cnb) and paketo can be used to build modular container images and can help transform source code using modular, reusable build functions
    List common goals of shifting toward devsecops, including secure by design and secure by default
    Describe how a strong culture can help provide top-tier container security
    Outline the importance of continuously updating the infrastructure layer
    Recognize the importance of securing inter-container communications
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 7s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 6s
    After completing this video, you will be able to differentiate between virtualization and containerization and outline key benefits provided by both. FREE ACCESS
  • Locked
    3.  Kubernetes vs. Docker
    5m 39s
    Upon completion of this video, you will be able to differentiate between Kubernetes and Docker container orchestration systems. FREE ACCESS
  • Locked
    4.  Container Adoption
    6m 8s
    After completing this video, you will be able to outline reasons why teams are adopting containers. FREE ACCESS
  • Locked
    5.  DevSecOps and Containers
    5m 57s
    Upon completion of this video, you will be able to describe how containers make it easier to do DevSecOps. FREE ACCESS
  • Locked
    6.  Container Security Challenges
    5m 51s
    After completing this video, you will be able to provide an overview of common security challenges presented by containers, such as attack surface size. FREE ACCESS
  • Locked
    7.  Application Programming Interface (API) Microgateways
    6m 4s
    In this video, we will describe how API microgateways can complement programming language frameworks to help secure development practices. FREE ACCESS
  • Locked
    8.  Modular Container Images
    5m 46s
    Upon completion of this video, you will be able to describe how Cloud Native Buildpacks (CNB) and Paketo can be used to build modular container images and can help transform source code using modular, reusable build functions. FREE ACCESS
  • Locked
    9.  Shift Left Towards DevSecOps
    5m 40s
    After completing this video, you will be able to list common goals of shifting toward DevSecOps, including secure by design and secure by default. FREE ACCESS
  • Locked
    10.  DevSecOps Culture
    6m 3s
    Upon completion of this video, you will be able to describe how a strong culture can help provide top-tier container security . FREE ACCESS
  • Locked
    11.  Infrastructure Layer Updates
    6m 24s
    After completing this video, you will be able to outline the importance of continuously updating the infrastructure layer. FREE ACCESS
  • Locked
    12.  Inter-container Communications
    5m 54s
    Upon completion of this video, you will be able to recognize the importance of securing inter-container communications. FREE ACCESS
  • Locked
    13.  Course Summary
    50s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 1.0 of 1 users Rating 1.0 of 1 users (1)
Rating 4.5 of 73 users Rating 4.5 of 73 users (73)
Rating 3.3 of 3 users Rating 3.3 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 80 users Rating 4.4 of 80 users (80)
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
Rating 4.6 of 4992 users Rating 4.6 of 4992 users (4992)