FileMood

Download DevSecOps Bootcamp

DevSecOps Bootcamp

Name

DevSecOps Bootcamp

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

7.5 GB

Total Files

169

Last Seen

Hash

7DCF46A3FE94C89033818797D1DC60636EF93A8F

/DevSpecOps Bootcamp/part 2/

21.3-How-to-start-implementing-DevSecOps-in-Organizations-_Practical-Tips_.mp4

422.1 MB

/DevSpecOps Bootcamp/part 1/

02 - Intro to DevSecOps.pdf

9.5 MB

03 - App Vulnerability Scanning.pdf

7.2 MB

04 - Vulnerability Management.pdf

5.1 MB

05 - Vulnerability Scanning for App Dependencies.pdf

4.4 MB

06 - Set up CD Pipeline.pdf

5.9 MB

07 - Image Scanning.pdf

7.6 MB

08 - AWS Cloud Security and Access Management.pdf

4.9 MB

09 - Secure Continuous Deployment & DAST.pdf

7.5 MB

10 - IaC and GitOps for DevSecOps.pdf

7.5 MB

11 - Logging & Monitoring for Security.pdf

7.9 MB

DevSpecOps Bootcamp.txt

4.5 KB

links.txt

3.9 KB

01 - Security Essentials.pdf

10.3 MB

/.../0 - Getting Started with the DevSecOps Bootcamp/

1 - Why learn DevSecOps.mp4

9.7 MB

2 - Pre-Requisites of Bootcamp.mp4

11.8 MB

3 - DevSecOps Bootcamp Curriculum Overview.mp4

87.2 MB

4 - Support and Other Bootcamp Materials.mp4

7.9 MB

5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4

6.6 MB

/DevSpecOps Bootcamp/part 1/1 - Security Essentials/

1 - Introduction to Security (1 - Security Essentials).mp4

5.6 MB

2 - Importance of Security & Impact of Security Breaches.mp4

50.5 MB

3 - How to Secure Systems Against Attacks.mp4

13.4 MB

4 - Types of Security Attacks - Part 1.mp4

77.8 MB

5 - Types of Security Attacks - Part 2.mp4

76.8 MB

6 - OWASP top 10 - Part 1.mp4

110.6 MB

7 - OWASP top 10 - Part 2.mp4

83.6 MB

8 - Security in Layers.mp4

37.5 MB

/.../2 - Introduction to DevSecOps/

1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps).mp4

40.1 MB

2 - Understand DevSecOps.mp4

47.5 MB

3 - Roles & Responsibilities in DevSecOps.mp4

32.0 MB

/.../3 - Application Vulnerability Scanning/

1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning).mp4

73.0 MB

2 - Impact of Missing Security Insights.mp4

10.5 MB

3 - Secret Scanning with GitLeaks - Local Environment.mp4

52.2 MB

4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4

67.2 MB

5 - False Positives & Fixing Security Vulnerabilities.mp4

64.7 MB

6 - Integrate SAST Scans in Release Pipeline.mp4

83.3 MB

/.../4 - Vulnerability Management and Remediation/

1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation).mp4

33.3 MB

2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4

105.8 MB

3 - Automate Uploading Security Scan Results to DefectDojo.mp4

107.1 MB

4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4

66.2 MB

/.../5 - Vulnerability Scanning for Application Dependencies/

1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies).mp4

56.0 MB

2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4

44.7 MB

3 - Overview of Static Security Scans in CI Pipeline.mp4

4.3 MB

/.../6 - Build a CD Pipeline/

1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp4

8.5 MB

2 - Introduction to Security Layers for AWS Access.mp4

31.7 MB

3 - Integrate CICD Pipeline with AWS ECR.mp4

73.4 MB

4 - Configure Application Deployment Environment on EC2 Server.mp4

37.5 MB

5 - Deploy Application to EC2 Server with Release Pipeline.mp4

59.0 MB

6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4

58.9 MB

7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4

86.8 MB

/.../7 - Image Scanning - Build Secure Docker Images/

1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images).mp4

5.7 MB

2 - Configure Automated Security Scanning in Application Image.mp4

67.3 MB

3 - Analyze & Fix Security Issues from Findings in Application Image.mp4

83.5 MB

4 - Automate Uploading Image Scanning Results in DefectDojo.mp4

34.7 MB

5 - Docker Security Best Practices.mp4

40.4 MB

6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4

46.1 MB

7 - Overview of Automated Application Code and Image Scanning Steps.mp4

3.1 MB

/.../8 - AWS Cloud Security & Access Management/

1 - AWS Security Essentials (8 - AWS Cloud Security & Access Management).mp4

28.3 MB

2 - Understand AWS Access Management using IAM Service.mp4

7.6 MB

3 - Securing AWS Root User Account.mp4

24.9 MB

4 - IAM Users, Groups & Policies.mp4

28.3 MB

5 - Secure Access from CICD Pipeline to AWS.mp4

49.1 MB

6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4

19.0 MB

7 - Overview of IAM Resources & Secure Access Management in AWS.mp4

9.6 MB

/.../9 - Secure Continuous Deployment & DAST/

1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deployment & DAST).mp4

29.3 MB

2 - Configure AWS Systems Manager for EC2 Server.mp4

43.5 MB

3 - AWS SSM Commands in Release Pipeline for Server Access.mp4

48.4 MB

4 - Secure Continuous Deployment to Server using SSM.mp4

68.6 MB

5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp4

60.7 MB

6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4

10.9 MB

7 - Understand Dynamic Application Security Testing (DAST).mp4

32.7 MB

8 - Configure Automated DAST Scans in CICD Pipeline.mp4

76.3 MB

9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4

7.8 MB

/.../10 - IaC and GitOps for DevSecOps/

1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp4

26.9 MB

2 - Terraform Script for AWS Infrastructure Provisioning.mp4

64.2 MB

3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4

26.2 MB

4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4

39.1 MB

5 - Configure Remote State for Terraform.mp4

28.5 MB

6 - Add Automated Security Scan to TF Infrastructure Code.mp4

37.3 MB

7 - Understand IaC Concept Cattle vs Pets.mp4

11.3 MB

/.../11 - Logging & Monitoring for Security/

1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp4

15.5 MB

2 - Introduction to CloudTrail and CloudWatch.mp4

15.7 MB

3 - CloudTrail Event History.mp4

33.9 MB

4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4

99.3 MB

5 - Create CloudWatch Alarm for EC2 Instance.mp4

65.7 MB

6 - Create Custom Metric Filter for Failed Login Metrics.mp4

43.5 MB

7 - Configure Alarm for Failed Login Attempts.mp4

37.9 MB

8 - Configure AWS Budgets for Monthly Usage Costs.mp4

23.6 MB

9 - Complete Bootcamp Part 1 - Next Steps.mp4

4.8 MB

/DevSpecOps Bootcamp/part 2/

12 - Introduction to Kubernetes Security.pdf

4.2 MB

12.1-Kubernetes-Security-Overview.mp4

25.5 MB

12.2-Kubernetes-Security-Best-Practices.mp4

97.8 MB

12.3-Provision-AWS-EKS-Cluster.mp4

87.8 MB

13 - Kubernetes Access Management.pdf

9.3 MB

13.1-Chapter-Introduction.mp4

8.5 MB

13.2-Role-Based-Access-Control-_RBAC_.mp4

62.9 MB

13.3-IAM-Roles-and-K8s-Roles-How-it-works.mp4

39.5 MB

13.4-Configure-IAM-Roles-and-link-to-K8s-Roles-in-IaC.mp4

63.1 MB

13.5-Configure-K8s-Role-and-ClusterRole-in-IaC.mp4

105.3 MB

13.6-Review-and-Test-Access.mp4

93.9 MB

13.7-Summary-_-Wrap-Up.mp4

15.5 MB

14 - Secure IaC Pipeline for EKS Provisioning.pdf

8.0 MB

14.1-Using-GitLab-OIDC-in-AWS.mp4

40.0 MB

14.2-Configure-Authentication-with-GitLab-Identity-Provider.mp4

45.2 MB

14.3-Pipeline-Configuration-for-establishing-a-secure-connection.mp4

85.6 MB

14.4-Terraform-Configuration-for-EKS-provisioning.mp4

110.9 MB

14.5-Summary-_-Wrap-Up.mp4

20.4 MB

15 - EKS Blueprints.pdf

10.3 MB

15.1-Introduction-to-EKS-Blueprints.mp4

16.6 MB

15.2-Overview-of-EKS-Add-ons-we-install.mp4

37.9 MB

15.3-Configure-EKS-Add-ons.mp4

73.8 MB

15.4-Troubleshooting-_-Tuning-Autoscaler.mp4

71.8 MB

15.5-Access-Token-Expiration.mp4

6.4 MB

16 - App Release Pipeline with ArgoCD.pdf

11.6 MB

16.1-Chapter-Overview.mp4

9.2 MB

16.2-ArgoCD-explained-_Part-1_-What_-Why-and-How.mp4

31.4 MB

16.3-ArgoCD-explained-_Part-2_-Benefits-and-Configuration.mp4

69.8 MB

16.4-Overview-of-CI-or-CD-Pipelines-to-Git-repositories.mp4

28.7 MB

16.5-Configure-ArgoCD-in-IaC-_Deploy-Argo-Part-1_.mp4

85.3 MB

16.6-IaC-Pipeline-Configuration-_Deploy-Argo-Part-2_.mp4

46.7 MB

16.7-Deployment-through-Pipeline-and-Access-Argo-UI-_Deploy-Argo-Part-3_.mp4

54.4 MB

16.8-K8s-Manifests-for-Microservices-App-using-Kustomize.mp4

78.7 MB

16.9-Create-GitOps-Pipeline-to-update-Kustomization-File.mp4

80.7 MB

16.10-Create-CI-Pipeline-that-triggers-GitOps-Pipeline.mp4

31.1 MB

16.11-See-Whole-Automated-Workflow-in-Action.mp4

33.4 MB

17 - Policy as Code.pdf

6.9 MB

17.1-Why-Policy-as-Code.mp4

12.9 MB

17.2-Introduction-to-Open-Policy-Agent-_OPA_-and-OPA-Gatekeeper.mp4

31.3 MB

17.3-How-Gatekeeper-and-OPA-works.mp4

27.4 MB

17.4-Install-OPA-Gatekeeper-in-Cluster.mp4

31.4 MB

17.5-Defining-Policies.mp4

32.7 MB

17.6-Define-Policy-to-reject-NodePort-Service.mp4

113.7 MB

17.7-Define-Policy-to-reject-Privileged-Containers.mp4

66.0 MB

17.8-Summary.mp4

8.1 MB

18 - Secrets Management.pdf

9.9 MB

18.1-Why-Secrets-Manager-are-needed.mp4

31.8 MB

18.2-Introduction-to-External-Secrets-Operator-in-K8s.mp4

11.1 MB

18.3-Capabilities-of-Secrets-Management-Tools.mp4

10.2 MB

18.4-Vault-Capabilities-_Vault-Deep-Dive-Part-1_.mp4

21.5 MB

18.5-How-Vault-works-_Vault-Deep-Dive-Part-2_.mp4

36.3 MB

18.6-Introduction-to-AWS-Secrets-Manager.mp4

13.8 MB

18.7-Deploy-External-Secrets-Controller-_Demo-Part-1_.mp4

47.7 MB

18.8-Create-SecretStore-and-ExternalSecret.mp4

64.4 MB

18.9-Use-Secret-in-Microservice-_Demo-Part-3_.mp4

18.2 MB

19 - Service Mesh with Istio.pdf

8.3 MB

19.1-Chapter-and-Demo-Overview.mp4

6.0 MB

19.2-Service-Mesh-and-Istio-What_-Why-and-How.mp4

54.8 MB

19.3-Install-Istio-in-K8s-cluster.mp4

96.0 MB

19.4-Configure-Traffic-Routing.mp4

91.0 MB

19.5-Configure-a-Secure-Gateway.mp4

60.6 MB

19.6-mTLS-Deep-Dive.mp4

79.9 MB

19.7-Authorization-in-Istio-Deep-Dive.mp4

49.5 MB

19.8-Istio-Policies-vs-K8s-Network-Policies.mp4

18.4 MB

19.9-Configure-Authorization-Policies.mp4

79.5 MB

19.10-Wrap-Up.mp4

5.3 MB

20 - Compliance as Code.pdf

7.0 MB

20.1-What-is-Compliance.mp4

14.0 MB

20.2-What-are-CIS-Benchmarks.mp4

43.6 MB

20.3-Why-Compliance-as-Code.mp4

8.5 MB

20.4-Demo-Overview-and-Introduction-to-AWS-Config.mp4

46.7 MB

20.5-Setting-up-AWS-Config-Rules.mp4

51.8 MB

20.6-Configure-Auto-Remediation-for-Insecure-Security-Groups-for-EC2-Instances.mp4

67.0 MB

20.7-Configure-Auto-Remediation-for-CloudTrail-Logging_-if-switched-off.mp4

28.8 MB

20.8-Configure-Compliance-Rules-for-AWS-EKS-Service.mp4

43.8 MB

20.9-Wrap-Up.mp4

6.2 MB

21.1-Why-DevSecOps-is-Important.mp4

100.7 MB

21.2-Driving-Cultural-Change-Real-World-Examples-of-Companies.mp4

243.6 MB

21.4-Final-Summary.-The-DevSecOps-Transformation.mp4

239.1 MB

22.-Apply-for-the-Certified-DevSecOps-Practitioner-credential-_Digital-Badge_.mp4

60.4 MB

 

Total files 169


Copyright © 2026 FileMood.com