DevSecOps Methodologies

DevSecOps    |    Intermediate
  • 14 videos | 1h 28m 30s
  • Includes Assessment
  • Earns a Badge
Rating 4.9 of 10 users Rating 4.9 of 10 users (10)
DevSecOps allows developers and project managers the ability to automate, monitor, and apply security at all phases of the software life cycle. This includes the planning, developing, building, testing, releasing, delivering, deploying, operating, and monitoring phases. In this course, you will explore factors that define DevSecOps as a methodology or framework. Discover the benefits of using the CALMS and Three Ways frameworks, and the reasons to integrate security into the application development life cycle. Examine key considerations when migrating from the DevOps life cycle to the DevSecOps life cycle and investigate the roles of the code analysis and change management phases. Explore other DevSecOps phases including compliance, threat assessment, research, and vulnerability analysis. Finally, learn how DevSecOps has become inherently decentralized, and why decentralization is critical.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the factors that define devsecops as a methodology or framework
    Provide an overview of the three ways framework
    Provide an overview of the calms framework
    Outline the reasons to integrate security into the application development life cycle
    Recognize key differences between agile and devsecops
    Outline key considerations when migrating from the devops life cycle to the devsecops life cycle
  • Provide an overview of code analysis in devsecops
    Recognize best practices for change management
    List common devsecops compliance considerations
    Outline devsecops phases like threat assessment and research
    List best practices related to devsecops vulnerability analysis
    Describe how devsecops has become inherently decentralized, and why decentralization is critical
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 8s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 42s
    Upon completion of this video, you will be able to outline the factors that define DevSecOps as a methodology or framework. FREE ACCESS
  • Locked
    3.  The Three Ways Framework
    7m 36s
    After completing this video, you will be able to provide an overview of the Three Ways framework. FREE ACCESS
  • Locked
    4.  The CALMS Framework
    6m 36s
    Upon completion of this video, you will be able to provide an overview of the CALMS framework. FREE ACCESS
  • Locked
    5.  Security and Application Integration
    7m 37s
    After completing this video, you will be able to outline the reasons to integrate security into the application development life cycle. FREE ACCESS
  • Locked
    6.  Agile vs. DevSecOps
    7m 12s
    Upon completion of this video, you will be able to recognize key differences between Agile and DevSecOps. FREE ACCESS
  • Locked
    7.  DevOps to DevSecOps
    6m 11s
    After completing this video, you will be able to outline key considerations when migrating from the DevOps life cycle to the DevSecOps life cycle. FREE ACCESS
  • Locked
    8.  Code Analysis in DevSecOps
    7m 40s
    Upon completion of this video, you will be able to provide an overview of code analysis in DevSecOps. FREE ACCESS
  • Locked
    9.  Change Management
    7m 32s
    After completing this video, you will be able to recognize best practices for change management. FREE ACCESS
  • Locked
    10.  DevSecOps Compliance
    8m 16s
    Upon completion of this video, you will be able to list common DevSecOps compliance considerations. FREE ACCESS
  • Locked
    11.  Threat Assessment and Research within DevSecOps
    6m 58s
    After completing this video, you will be able to outline DevSecOps phases like threat assessment and research. FREE ACCESS
  • Locked
    12.  DevSecOps Vulnerability Analysis
    7m 20s
    Upon completion of this video, you will be able to list best practices related to DevSecOps vulnerability analysis. FREE ACCESS
  • Locked
    13.  DevSecOps Decentralization
    6m 51s
    After completing this video, you will be able to describe how DevSecOps has become inherently decentralized, and why decentralization is critical. FREE ACCESS
  • Locked
    14.  Course Summary
    53s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.0 of 2 users Rating 4.0 of 2 users (2)
Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
Rating 4.9 of 22 users Rating 4.9 of 22 users (22)
Rating 4.5 of 154 users Rating 4.5 of 154 users (154)