HOME > IT & Software > Zero-to-Hero Developer Security Operations Course

Zero-to-Hero Developer Security Operations Course

SynopsisZero-to-Hero Developer Security Operations Course, available...
Zero-to-Hero Developer Security Operations Course  No.1

Zero-to-Hero Developer Security Operations Course, available at $44.99, has an average rating of 4.17, with 38 lectures, based on 6 reviews, and has 30 subscribers.

You will learn about Developer Security Operations Zero-to-Hero Understand the fundamentals of leveraging the Veracode Platform as a Security Engineer. Apply the security engineering concepts to a real use case scenario. Work with industry recognized standard tooling from Veracode. Work with industry recognized standard tooling from Burp Suite. Work with industry recognized standard tooling from Elasticsearch. Work with industry recognized standard tooling from JFROG Artifactory. This course is ideal for individuals who are The purpose of this curriculum is to teach security engineering fundamentals. The concepts covered will enable individuals to be able to work independently. After establishing the processes described in the table of contents a security engineer will be able to manage the fundamental aspects of security for a company and influence organizational change. The typical timeframe for implementation is 3 months. It is particularly useful for The purpose of this curriculum is to teach security engineering fundamentals. The concepts covered will enable individuals to be able to work independently. After establishing the processes described in the table of contents a security engineer will be able to manage the fundamental aspects of security for a company and influence organizational change. The typical timeframe for implementation is 3 months.

Enroll now: Zero-to-Hero Developer Security Operations Course

Summary

Title: Zero-to-Hero Developer Security Operations Course

Price: $44.99

Average Rating: 4.17

Number of Lectures: 38

Number of Published Lectures: 38

Number of Curriculum Items: 38

Number of Published Curriculum Objects: 38

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Developer Security Operations Zero-to-Hero
  • Understand the fundamentals of leveraging the Veracode Platform as a Security Engineer.
  • Apply the security engineering concepts to a real use case scenario.
  • Work with industry recognized standard tooling from Veracode.
  • Work with industry recognized standard tooling from Burp Suite.
  • Work with industry recognized standard tooling from Elasticsearch.
  • Work with industry recognized standard tooling from JFROG Artifactory.
  • Who Should Attend

  • The purpose of this curriculum is to teach security engineering fundamentals. The concepts covered will enable individuals to be able to work independently. After establishing the processes described in the table of contents a security engineer will be able to manage the fundamental aspects of security for a company and influence organizational change. The typical timeframe for implementation is 3 months.
  • Target Audiences

  • The purpose of this curriculum is to teach security engineering fundamentals. The concepts covered will enable individuals to be able to work independently. After establishing the processes described in the table of contents a security engineer will be able to manage the fundamental aspects of security for a company and influence organizational change. The typical timeframe for implementation is 3 months.
  • Welcome to our approach to culture, automation, and platform design, where we forge your team’s security skills like a sword. We integrate security as a shared responsibility throughout the entire IT life cycle and equip your team with the necessary skills for implementing “shift-left” development processes, like honing and sharpening a dagger.

    Our curriculum includes automated Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Container Scanning, Penetration Testing, and systematic logging to evaluate scanning results, like the fire that fuels your passion for security. And with industry-recognized certifications and executive dashboards to monitor program progress, we’ll help keep your assets safe.

    Our training program is supported by industry-recognized certificates from Veracode, like the foundation and structure of your sword. We’ve developed a system that not only leverages state-of-the-art security tools but also provides an automated system that ensures accountability and open communication amongst teams, like the etiquette and grace that a warrior carries on and off the battlefield.

    We follow the Net Forward Energy Ratio (NeFER) strategy principle, which provides a systematic process of questions that encourages individuals to take accountability for their work and encourages them to take steps in a forward direction, like a warrior who plans their battles wisely.

    Our ideal client for this training program is a Security Engineer who works for a midsize corporation with roughly 40-50 employees. We’ll offer the best training coupled with state-of-the-art technology and research-based management practicesto help you wield your security skills like a sword.

    The target audience for this training program falls into three categories – CISO, Security Team Lead, or Security Engineer – each with their own unique challenges and opportunities, like the different battles that a warrior faces.

    Join us on this journey to become security experts, where we’ll hone your skills like a dagger, fuel your passion like fire, and equip you with the knowledge and tools to protect your organization’s assets.

    Course Curriculum

    Chapter 1: Veracode

    Lecture 1: Introduction to Veracode

    Lecture 2: Security Champion

    Lecture 3: Dynamic Analysis

    Lecture 4: Understanding Dashboards

    Lecture 5: Custom Dashboard Filters

    Lecture 6: Customize Visualizations

    Lecture 7: Save and Share Dashboards

    Lecture 8: Software Composition Analysis

    Lecture 9: Static Analysis

    Lecture 10: Security Report

    Lecture 11: Knowledge Check

    Chapter 2: Penetration Testing

    Lecture 1: Getting Started with Burp Suite

    Lecture 2: Burp Proxy

    Lecture 3: Burp Repeater

    Lecture 4: Burp Intruder

    Lecture 5: Burp Collaborator Client

    Lecture 6: Burp Scanner and Summary

    Chapter 3: Monitoring

    Lecture 1: Elastic SIEM

    Lecture 2: Getting Started

    Lecture 3: Filebeat

    Lecture 4: Filebeat AWS Module and Summary

    Chapter 4: Center For Internet Security (CIS) Benchmark

    Lecture 1: CIS Foundations Benchmark AWS IAM

    Lecture 2: Storage

    Lecture 3: Logging

    Lecture 4: Monitoring

    Lecture 5: Networking and Summary

    Lecture 6: AWS IAM

    Lecture 7: AWS SNS

    Lecture 8: AWS S3

    Lecture 9: AWS Config

    Lecture 10: AWS CloudTrail

    Lecture 11: AWS CloudWatch

    Lecture 12: AWS CloudWatch Metrics

    Lecture 13: AWS KMS

    Lecture 14: Amazon SQS

    Lecture 15: AWS VPC

    Lecture 16: AWS Organizations

    Chapter 5: Automated Build Scanning with Xray

    Lecture 1: JFROG Xray

    Instructors

  • Zero-to-Hero Developer Security Operations Course  No.2
    Evan Gertis
    DevSecOps Engineer
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 2 votes
  • 3 stars: 0 votes
  • 4 stars: 0 votes
  • 5 stars: 4 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!