DevSecOps in Continuous Integration & Delivery (CI/CD)

DevSecOps    |    Intermediate
  • 13 videos | 1h 20m 51s
  • Includes Assessment
  • Earns a Badge
Rating 3.3 of 3 users Rating 3.3 of 3 users (3)
Continuous integration and continuous delivery (CI/CD) is a coding philosophy and set of practices used by application development teams to deploy and deliver rapid, reliable code changes. You will often hear CI/CD referenced alongside DevOps, which is a collection of ideas, practices, processes, and technologies used by project and development teams to streamline product development. In this course, you will explore the fundamental elements and benefits of CI/CD and the key differences between CI/CD and DevOps. Then you will discover how an effective DevSecOps pipeline can help ensure security. Next, you will investigate the potential security vulnerabilities associated with each phase of the DevSecOps pipeline. Finally, you will examine common DevSecOps security recommendations, such as implementing secure coding guidelines, building security into applications, and validating input data.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of ci/cd
    Describe the fundamental elements of ci/cd
    List common benefits of ci/cd implementations
    Provide an overview of the ci/cd pipeline
    Differentiate between ci/cd and devops
    Describe security vulnerabilities associated with the threat modeling phase of the devsecops pipeline
  • Describe security vulnerabilities associated with the scanning phase of the devsecops pipeline
    Outline security vulnerabilities associated with the analysis phase of the devsecops pipeline
    List security vulnerabilities associated with the remediation phase of the devsecops pipeline
    Recognize security vulnerabilities associated with the monitoring phase of the devsecops pipeline
    List common devsecops security recommendations, such as implementing secure coding guidelines, building security into applications, and validating input data
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 14s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 55s
    After completing this video, you will be able to provide an overview of CI/CD. FREE ACCESS
  • Locked
    3.  CI/CD Fundamentals
    6m 8s
    Upon completion of this video, you will be able to describe the fundamental elements of CI/CD. FREE ACCESS
  • Locked
    4.  Benefits of CI/CD
    6m 1s
    After completing this video, you will be able to list common benefits of CI/CD implementations. FREE ACCESS
  • Locked
    5.  CI/CD Pipeline
    10m 20s
    Upon completion of this video, you will be able to provide an overview of the CI/CD pipeline. FREE ACCESS
  • Locked
    6.  CI/CD vs. DevOps
    6m 31s
    In this video, we will differentiate between CI/CD and DevOps. FREE ACCESS
  • Locked
    7.  Threat Modeling Phase
    8m 25s
    After completing this video, you will be able to describe security vulnerabilities associated with the threat modeling phase of the DevSecOps pipeline. FREE ACCESS
  • Locked
    8.  Scanning Phase
    6m 51s
    Upon completion of this video, you will be able to describe security vulnerabilities associated with the scanning phase of the DevSecOps pipeline. FREE ACCESS
  • Locked
    9.  Analysis Phase
    6m 38s
    After completing this video, you will be able to outline security vulnerabilities associated with the analysis phase of the DevSecOps pipeline. FREE ACCESS
  • Locked
    10.  Remediation Phase
    6m 34s
    Upon completion of this video, you will be able to list security vulnerabilities associated with the remediation phase of the DevSecOps pipeline. FREE ACCESS
  • Locked
    11.  Monitoring Phase
    6m 56s
    After completing this video, you will be able to recognize security vulnerabilities associated with the monitoring phase of the DevSecOps pipeline. FREE ACCESS
  • Locked
    12.  Security Recommendations
    6m 33s
    Upon completion of this video, you will be able to list common DevSecOps security recommendations, such as implementing secure coding guidelines, building security into applications, and validating input data. FREE ACCESS
  • Locked
    13.  Course Summary
    48s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 82 users Rating 4.5 of 82 users (82)
Rating 4.5 of 4 users Rating 4.5 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 3 users Rating 4.7 of 3 users (3)
Rating 4.6 of 14 users Rating 4.6 of 14 users (14)
Rating 4.9 of 10 users Rating 4.9 of 10 users (10)