HOME > IT & Software > DevOps- Configuration Management, CICD, Monitoring-Security

DevOps- Configuration Management, CICD, Monitoring-Security

SynopsisDevOps: Configuration Management, CI/CD, Monitoring-Security,...
DevOps- Configuration Management, CICD, Monitoring-Security  No.1

DevOps: Configuration Management, CI/CD, Monitoring-Security, available at $44.99, has an average rating of 4.3, with 49 lectures, 2 quizzes, based on 32 reviews, and has 376 subscribers.

You will learn about Implement DevOps using a Docker container Explore continuous integration tools and different configuration management tools. Explore Container orchestration with best practices and implement security solutions in the DevOps cycle. Integrate Security into Continuous Delivery workflows for continuous security. Leverage Infrastructure as Code techniques for secure configuration management and provisioning. Eliminate manual security practices such as risk assessments and audits by automating all the verification. Build a better defense mechanism by the use of Red and Blue teams. Create automatic compliance by using the DevOps Audit Defense Toolkit. Build continuous a feedback loop by automating all security checks throughout the Continuous Delivery pipeline. This course is ideal for individuals who are System Administrators, Solution Architects, DevOps Engineers, Security Consultant, Cloud Security Strategists who want to understand the concept of building a DevOps strategy from scratch and are looking to use the principles of DevOps to secure their software in a continuous and iterative manner! It is particularly useful for System Administrators, Solution Architects, DevOps Engineers, Security Consultant, Cloud Security Strategists who want to understand the concept of building a DevOps strategy from scratch and are looking to use the principles of DevOps to secure their software in a continuous and iterative manner!.

Enroll now: DevOps: Configuration Management, CI/CD, Monitoring-Security

Summary

Title: DevOps: Configuration Management, CI/CD, Monitoring-Security

Price: $44.99

Average Rating: 4.3

Number of Lectures: 49

Number of Quizzes: 2

Number of Published Lectures: 49

Number of Published Quizzes: 2

Number of Curriculum Items: 51

Number of Published Curriculum Objects: 51

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Implement DevOps using a Docker container
  • Explore continuous integration tools and different configuration management tools.
  • Explore Container orchestration with best practices and implement security solutions in the DevOps cycle.
  • Integrate Security into Continuous Delivery workflows for continuous security.
  • Leverage Infrastructure as Code techniques for secure configuration management and provisioning.
  • Eliminate manual security practices such as risk assessments and audits by automating all the verification.
  • Build a better defense mechanism by the use of Red and Blue teams.
  • Create automatic compliance by using the DevOps Audit Defense Toolkit.
  • Build continuous a feedback loop by automating all security checks throughout the Continuous Delivery pipeline.
  • Who Should Attend

  • System Administrators, Solution Architects, DevOps Engineers, Security Consultant, Cloud Security Strategists who want to understand the concept of building a DevOps strategy from scratch and are looking to use the principles of DevOps to secure their software in a continuous and iterative manner!
  • Target Audiences

  • System Administrators, Solution Architects, DevOps Engineers, Security Consultant, Cloud Security Strategists who want to understand the concept of building a DevOps strategy from scratch and are looking to use the principles of DevOps to secure their software in a continuous and iterative manner!
  • If continuous security in development lifecycle like configuration checks, code analysis, vulnerability scanning etc. is not adequately automated then it leads to increased security violations and hacking/phishing attacks. DevOps enables rapid application development and follows a traditional way of performing security checks. It helps an organization deploy software while maintaining service stability. If you’re looking to protect your organization with the collaboration of DevOps and security then is the perfect Course for you!

    This comprehensive 2-in-1 course takes a step-by-step practical approach to protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework. You’ll initially implement a complete DevOps cycle with use cases as well as implement DevOps using a Docker container. You’ll explore continuous integration tools and different configuration management tools using Chef, puppet, and Ansible. Moving further, you’ll create automatic compliance by using the DevOps Audit Defense Toolkit. Finally, you’ll build a continuous feedback loop by automating all security checks throughout the Continuous Delivery pipeline.

    Towards the end of this course, you’ll protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework.

    Contents and Overview

    This training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible.

    The first course, Professional DevOps, covers DevOps tools and technology frameworks to implement DevOps for your organization. This course helps you implement a complete DevOps cycle in your existing IT environment. Each section of this course will help you implement the DevOps culture in your professional environment. With the help of source control, continuous build, continuous integration, automated test with quality controls, and container technologies, this course will be your perfect guide to learn and apply DevOps in your organization. By the end of this course, you’ll be able to identify and choose the appropriate tools and technology framework to implement DevOps in your organization.

    The second course, Practical DevOps Security,covers protecting your organization with the collaboration of DevOps and security. This course shows you how to apply DevOps security best practices at every stage in your DevOps pipeline. You will learn proven approaches to reducing vulnerability and strengthening your defenses against attack. You will understand using security as code with the intent of making security and compliance consumable as a service. This course explains how DevOps security practices differ from traditional security approaches and provide techniques to embed governance and cybersecurity functions throughout the DevOps workflow. By the end of the course, you will have learned best practices in DevSecOps, the core concepts of secure DevOps, and how security can be integrated into the development pipeline.

    Towards the end of this course, you’ll protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework.

    About the Authors

    Umar Murtazahas more than 25 years’ experience of System Administration in implementing, commissioning development, testing, and production environments. He has designed and implemented a number of DevOps environments, conducted 4- day hands-on DevOps training sessions at a number of private and government telecommunications and software companies/institutions.

    Gurpreet Sachdevais a Technology Executive with 21+ years’ experience working on some of the most challenging technologies related to Cloud Computing, DevOps, and Security. Gurpreet did his B. Tech (C.S.) from NIT, Kurukshetra, and M.S. (Software Systems) from BITS, Pilani. He is currently working as Assistant Vice President—Technology with Aricent, Gurgaon. He is a keen Java enthusiast and co-founder of Delhi – NCR – Java User Group. Gurpreet is an invited speaker in prestigious conferences such as Oracle – Java One, Great India Developer Summit.

    Course Curriculum

    Chapter 1: Professional DevOps

    Lecture 1: The Course Overview

    Lecture 2: What Is DevOps? What Needs to be Done to Excel at DevOps?

    Lecture 3: New DevOps Roles

    Lecture 4: Continuous Integration, Configuration Management, and Continuous Delivery

    Lecture 5: Continuous Monitoring, Testing, and Deployment

    Lecture 6: Software Configuration Management Tools (Git)

    Lecture 7: Vagrant – Lightweight, Reproducible, and Portable Development Environments

    Lecture 8: The Role of Docker in the DevOps Cycle

    Lecture 9: Docker Networking

    Lecture 10: Docker Deep Dive with Use Cases

    Lecture 11: Configuration Management Tools with Chef, Puppet, and Ansible

    Lecture 12: Ansible – Provisioning, Configuration Management, and Application Deployment Too

    Lecture 13: Jenkins – Continuous Integration and Continuous Delivery

    Lecture 14: Configuring Jenkins with Git

    Lecture 15: Kubernetes – Managing Containerized Workloads and Services

    Lecture 16: DevOps Monitoring Solutions Using Monit and Nagios

    Lecture 17: Set Up and Configure Nagios

    Lecture 18: Infrastructure Monitoring Using Nagios

    Lecture 19: Best Practices in DevOps Lifecycle

    Lecture 20: Security Best Practices in DevOps

    Lecture 21: Tool for Security Checks in Each Cycle of DevOps

    Chapter 2: Practical DevOps Security

    Lecture 1: The Course Overview

    Lecture 2: Integrate Security for a DevOps World

    Lecture 3: Risk Management in a Rapidly Changing World

    Lecture 4: Key Principles and Benefits of Secure DevOps

    Lecture 5: Business-Driven Security Strategies

    Lecture 6: OWASP Security Guidelines

    Lecture 7: Integrating Security Into CI/CD Pipeline

    Lecture 8: Automated Security Testing

    Lecture 9: Tools of the Trade

    Lecture 10: Red and Blue Teams

    Lecture 11: Security Requirements

    Lecture 12: Architectural Considerations

    Lecture 13: Threat Modeling, Data Flow Diagrams, and Attack Surface

    Lecture 14: Identity and Access Management

    Lecture 15: Code Inspection

    Lecture 16: Environment Hardening

    Lecture 17: What Is Static Application Security Testing?

    Lecture 18: Embed SAST into the CI/CD Pipeline

    Lecture 19: What Is Dynamic Application Security Testing?

    Lecture 20: Embed DAST Into the Pipeline

    Lecture 21: Runtime Application Self-Protection (RASP) versus Interactive Application Securi

    Lecture 22: Software Composition Analysis

    Lecture 23: Infrastructure as Code

    Lecture 24: Key Management and Identity Management

    Lecture 25: Chaos Monkey and Fuzz Testing

    Lecture 26: Security Monitoring

    Lecture 27: Governance, Risk, Compliance and Audit

    Lecture 28: Incident Response and Forensics

    Instructors

  • DevOps- Configuration Management, CICD, Monitoring-Security  No.2
    Packt Publishing
    Tech Knowledge in Motion
  • Rating Distribution

  • 1 stars: 1 votes
  • 2 stars: 1 votes
  • 3 stars: 4 votes
  • 4 stars: 13 votes
  • 5 stars: 13 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!