DevOps Security Considerations: Securing DevOps Pipeline

DevOps    |    Intermediate
  • 11 videos | 54m 55s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 312 users Rating 4.4 of 312 users (312)
In this 11-video course, learners can explore policy requirements and guidelines setting implementation standards for security requirements specified in the baseline IT security policy, and the role, approaches, and tools needed to implement and apply security in DevOps. Other key topics covered here include essential components for building logging and auditing pipelines; steps involved in implementing mature DevOps security model; and demonstrating how to control and manage permissions granted to user in GitHub (a Git repository hosting company) and Docker Hub. You will learn essential security features of Jenkins that will secure continuous build pipelines, along with the role of security in DevOps workflow, for continuous integration and continuous development (CI/CD) implementation. Next, learn how to implement continuous security in DevOps pipelines. You will explore the need for test-driven security in applications, infrastructure and automated DevOps pipelines, along with components used to build logging and auditing pipelines. Finally, discover how to control permissions in GitHub and how to manage permissions in Docker Hub, along with the security features of Jenkins.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe policy requirements and the guidelines that set the implementation standard for the security requirements specified in the baseline it security policy
    Recognize the role of security in devops when building and developing the devops workflow to implement ci/cd processes
    Describe the implementation of continuous security in devops pipelines, with a focus on test-driven development, monitoring, responding to attacks, assessing risks, and maturing security
    Recognize the need for applying test-driven security on applications, infrastructure, and automated devops pipelines
    Describe components that can be used to build logging and auditing pipelines
  • Recall the tools and processes that can be used to apply security for devops-compliant processes in order to manage intrusion and incident responses
    Control permissions granted to users in github and manage permissions in docker hub
    Configure jenkins security features to secure continuous build pipelines
    Recognize the steps involved in implementing mature a devops security model that can help assess risks and facilitate continuous security
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 28s
  • 10m 44s
    Upon completion of this video, you will be able to describe the policy requirements and guidelines that set the implementation standard for the security requirements specified in the baseline IT security policy. FREE ACCESS
  • Locked
    3.  Securing the DevOps Workflow
    4m 31s
    Upon completion of this video, you will be able to recognize the role of security in DevOps when building and developing the DevOps workflow to implement CI/CD processes. FREE ACCESS
  • Locked
    4.  Continuous Security
    5m 47s
    After completing this video, you will be able to describe the implementation of continuous security in DevOps pipelines, with a focus on test-driven development, monitoring, responding to attacks, assessing risks, and maturing security. FREE ACCESS
  • Locked
    5.  DevOps Security Approaches
    6m 29s
    After completing this video, you will be able to recognize the need for applying security to applications, infrastructure, and automated DevOps pipelines. FREE ACCESS
  • Locked
    6.  Logging and Auditing Pipelines
    3m 39s
    After completing this video, you will be able to describe components that can be used to build logging and auditing pipelines. FREE ACCESS
  • Locked
    7.  Tools and Processes for Securing DevOps
    6m 4s
    Upon completion of this video, you will be able to recall the tools and processes that can be used to apply security for DevOps-compliant processes in order to manage intrusion and incident responses. FREE ACCESS
  • Locked
    8.  GitHub and Docker Hub Security
    2m 56s
    In this video, you will learn how to control permissions granted to users in GitHub and manage permissions in Docker Hub. FREE ACCESS
  • Locked
    9.  Securing Pipelines with Jenkins
    4m 16s
    Learn how to configure Jenkins security features to secure continuous build pipelines. FREE ACCESS
  • Locked
    10.  Security Model and Risk Assessment
    6m 30s
    Upon completion of this video, you will be able to recognize the steps involved in implementing a mature DevOps security model that can help assess risks and facilitate continuous security. FREE ACCESS
  • Locked
    11.  Course Summary
    1m 32s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 103 users Rating 4.7 of 103 users (103)
Rating 4.0 of 2 users Rating 4.0 of 2 users (2)
Rating 4.6 of 38 users Rating 4.6 of 38 users (38)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 185 users Rating 4.3 of 185 users (185)
Rating 4.3 of 40 users Rating 4.3 of 40 users (40)
Rating 4.4 of 701 users Rating 4.4 of 701 users (701)