[ FreeCourseWeb.com ] DevSecOps Bootcamp
File List
- ~Get Your Files Here !/1 - Security Essentials/6 - OWASP top 10 - Part 1.mp4 105.5 MB
- ~Get Your Files Here !/4 - Vulnerability Management and Remediation/3 - Automate Uploading Security Scan Results to DefectDojo.mp4 102.1 MB
- ~Get Your Files Here !/4 - Vulnerability Management and Remediation/2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4 100.9 MB
- ~Get Your Files Here !/11 - Logging & Monitoring for Security/4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4 94.7 MB
- ~Get Your Files Here !/0 - Getting Started with the DevSecOps Bootcamp/3 - DevSecOps Bootcamp Curriculum Overview.mp4 83.2 MB
- ~Get Your Files Here !/6 - Build a CD Pipeline/7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4 82.7 MB
- ~Get Your Files Here !/1 - Security Essentials/7 - OWASP top 10 - Part 2.mp4 79.8 MB
- ~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/3 - Analyze & Fix Security Issues from Findings in Application Image.mp4 79.6 MB
- ~Get Your Files Here !/3 - Application Vulnerability Scanning/6 - Integrate SAST Scans in Release Pipeline.mp4 79.5 MB
- ~Get Your Files Here !/1 - Security Essentials/4 - Types of Security Attacks - Part 1.mp4 74.2 MB
- ~Get Your Files Here !/1 - Security Essentials/5 - Types of Security Attacks - Part 2.mp4 73.2 MB
- ~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/8 - Configure Automated DAST Scans in CICD Pipeline.mp4 72.8 MB
- ~Get Your Files Here !/6 - Build a CD Pipeline/3 - Integrate CICD Pipeline with AWS ECR.mp4 70.0 MB
- ~Get Your Files Here !/3 - Application Vulnerability Scanning/1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning).mp4 69.6 MB
- ~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/4 - Secure Continuous Deployment to Server using SSM.mp4 65.4 MB
- ~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/2 - Configure Automated Security Scanning in Application Image.mp4 64.1 MB
- ~Get Your Files Here !/3 - Application Vulnerability Scanning/4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4 64.1 MB
- ~Get Your Files Here !/4 - Vulnerability Management and Remediation/4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4 63.1 MB
- ~Get Your Files Here !/11 - Logging & Monitoring for Security/5 - Create CloudWatch Alarm for EC2 Instance.mp4 62.6 MB
- ~Get Your Files Here !/3 - Application Vulnerability Scanning/5 - False Positives & Fixing Security Vulnerabilities.mp4 61.7 MB
- ~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/2 - Terraform Script for AWS Infrastructure Provisioning.mp4 61.2 MB
- ~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp4 57.8 MB
- ~Get Your Files Here !/6 - Build a CD Pipeline/5 - Deploy Application to EC2 Server with Release Pipeline.mp4 56.3 MB
- ~Get Your Files Here !/6 - Build a CD Pipeline/6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4 56.1 MB
- ~Get Your Files Here !/5 - Vulnerability Scanning for Application Dependencies/1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies).mp4 53.4 MB
- ~Get Your Files Here !/3 - Application Vulnerability Scanning/3 - Secret Scanning with GitLeaks - Local Environment.mp4 49.8 MB
- ~Get Your Files Here !/1 - Security Essentials/2 - Importance of Security & Impact of Security Breaches.mp4 48.1 MB
- ~Get Your Files Here !/8 - AWS Cloud Security & Access Management/5 - Secure Access from CICD Pipeline to AWS.mp4 46.8 MB
- ~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/3 - AWS SSM Commands in Release Pipeline for Server Access.mp4 46.2 MB
- ~Get Your Files Here !/2 - Introduction to DevSecOps/2 - Understand DevSecOps.mp4 45.3 MB
- ~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4 44.0 MB
- ~Get Your Files Here !/5 - Vulnerability Scanning for Application Dependencies/2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4 42.6 MB
- ~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/2 - Configure AWS Systems Manager for EC2 Server.mp4 41.5 MB
- ~Get Your Files Here !/11 - Logging & Monitoring for Security/6 - Create Custom Metric Filter for Failed Login Metrics.mp4 41.4 MB
- ~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/5 - Docker Security Best Practices.mp4 38.5 MB
- ~Get Your Files Here !/2 - Introduction to DevSecOps/1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps).mp4 38.3 MB
- ~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4 37.3 MB
- ~Get Your Files Here !/11 - Logging & Monitoring for Security/7 - Configure Alarm for Failed Login Attempts.mp4 36.1 MB
- ~Get Your Files Here !/1 - Security Essentials/8 - Security in Layers.mp4 35.8 MB
- ~Get Your Files Here !/6 - Build a CD Pipeline/4 - Configure Application Deployment Environment on EC2 Server.mp4 35.8 MB
- ~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/6 - Add Automated Security Scan to TF Infrastructure Code.mp4 35.6 MB
- ~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/4 - Automate Uploading Image Scanning Results in DefectDojo.mp4 33.1 MB
- ~Get Your Files Here !/11 - Logging & Monitoring for Security/3 - CloudTrail Event History.mp4 32.3 MB
- ~Get Your Files Here !/4 - Vulnerability Management and Remediation/1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation).mp4 31.8 MB
- ~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/7 - Understand Dynamic Application Security Testing (DAST).mp4 31.2 MB
- ~Get Your Files Here !/2 - Introduction to DevSecOps/3 - Roles & Responsibilities in DevSecOps.mp4 30.5 MB
- ~Get Your Files Here !/6 - Build a CD Pipeline/2 - Introduction to Security Layers for AWS Access.mp4 30.2 MB
- ~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deployment & DAST).mp4 27.9 MB
- ~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/5 - Configure Remote State for Terraform.mp4 27.1 MB
- ~Get Your Files Here !/8 - AWS Cloud Security & Access Management/4 - IAM Users, Groups & Policies.mp4 27.0 MB
- ~Get Your Files Here !/8 - AWS Cloud Security & Access Management/1 - AWS Security Essentials (8 - AWS Cloud Security & Access Management).mp4 27.0 MB
- ~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp4 25.6 MB
- ~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4 25.0 MB
- ~Get Your Files Here !/8 - AWS Cloud Security & Access Management/3 - Securing AWS Root User Account.mp4 23.8 MB
- ~Get Your Files Here !/11 - Logging & Monitoring for Security/8 - Configure AWS Budgets for Monthly Usage Costs.mp4 22.5 MB
- ~Get Your Files Here !/8 - AWS Cloud Security & Access Management/6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4 18.2 MB
- ~Get Your Files Here !/11 - Logging & Monitoring for Security/2 - Introduction to CloudTrail and CloudWatch.mp4 15.0 MB
- ~Get Your Files Here !/11 - Logging & Monitoring for Security/1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp4 14.8 MB
- ~Get Your Files Here !/1 - Security Essentials/3 - How to Secure Systems Against Attacks.mp4 12.8 MB
- ~Get Your Files Here !/0 - Getting Started with the DevSecOps Bootcamp/2 - Pre-Requisites of Bootcamp.mp4 11.3 MB
- ~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/7 - Understand IaC Concept Cattle vs Pets.mp4 10.8 MB
- ~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4 10.4 MB
- ~Get Your Files Here !/3 - Application Vulnerability Scanning/2 - Impact of Missing Security Insights.mp4 10.0 MB
- ~Get Your Files Here !/01 - Security Essentials.pdf 9.8 MB
- ~Get Your Files Here !/0 - Getting Started with the DevSecOps Bootcamp/1 - Why learn DevSecOps.mp4 9.3 MB
- ~Get Your Files Here !/8 - AWS Cloud Security & Access Management/7 - Overview of IAM Resources & Secure Access Management in AWS.mp4 9.2 MB
- ~Get Your Files Here !/02 - Intro to DevSecOps.pdf 9.0 MB
- ~Get Your Files Here !/6 - Build a CD Pipeline/1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp4 8.1 MB
- ~Get Your Files Here !/11 - Logging & Monitoring for Security.pdf 7.5 MB
- ~Get Your Files Here !/0 - Getting Started with the DevSecOps Bootcamp/4 - Support and Other Bootcamp Materials.mp4 7.5 MB
- ~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4 7.4 MB
- ~Get Your Files Here !/8 - AWS Cloud Security & Access Management/2 - Understand AWS Access Management using IAM Service.mp4 7.2 MB
- ~Get Your Files Here !/07 - Image Scanning.pdf 7.2 MB
- ~Get Your Files Here !/09 - Secure Continuous Deployment & DAST.pdf 7.2 MB
- ~Get Your Files Here !/10 - IaC and GitOps for DevSecOps.pdf 7.2 MB
- ~Get Your Files Here !/03 - App Vulnerability Scanning.pdf 6.8 MB
- ~Get Your Files Here !/0 - Getting Started with the DevSecOps Bootcamp/5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4 6.3 MB
- ~Get Your Files Here !/06 - Set up CD Pipeline.pdf 5.7 MB
- ~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images).mp4 5.4 MB
- ~Get Your Files Here !/1 - Security Essentials/1 - Introduction to Security (1 - Security Essentials).mp4 5.3 MB
- ~Get Your Files Here !/04 - Vulnerability Management.pdf 4.9 MB
- ~Get Your Files Here !/08 - AWS Cloud Security and Access Management.pdf 4.7 MB
- ~Get Your Files Here !/11 - Logging & Monitoring for Security/9 - Complete Bootcamp Part 1 - Next Steps.mp4 4.6 MB
- ~Get Your Files Here !/05 - Vulnerability Scanning for App Dependencies.pdf 4.2 MB
- ~Get Your Files Here !/5 - Vulnerability Scanning for Application Dependencies/3 - Overview of Static Security Scans in CI Pipeline.mp4 4.1 MB
- ~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/7 - Overview of Automated Application Code and Image Scanning Steps.mp4 3.0 MB
- ~Get Your Files Here !/DevSpecOps Bootcamp.txt 4.4 KB
- ~Get Your Files Here !/links.txt 3.8 KB
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- Get Bonus Downloads Here.url 183 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.