DevOps Security Considerations: Securing DevOps Pipeline
DevOps
| Intermediate
- 11 videos | 54m 55s
- Includes Assessment
- Earns a Badge
In this 11-video course, learners can explore policy requirements and guidelines setting implementation standards for security requirements specified in the baseline IT security policy, and the role, approaches, and tools needed to implement and apply security in DevOps. Other key topics covered here include essential components for building logging and auditing pipelines; steps involved in implementing mature DevOps security model; and demonstrating how to control and manage permissions granted to user in GitHub (a Git repository hosting company) and Docker Hub. You will learn essential security features of Jenkins that will secure continuous build pipelines, along with the role of security in DevOps workflow, for continuous integration and continuous development (CI/CD) implementation. Next, learn how to implement continuous security in DevOps pipelines. You will explore the need for test-driven security in applications, infrastructure and automated DevOps pipelines, along with components used to build logging and auditing pipelines. Finally, discover how to control permissions in GitHub and how to manage permissions in Docker Hub, along with the security features of Jenkins.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe policy requirements and the guidelines that set the implementation standard for the security requirements specified in the baseline it security policyRecognize the role of security in devops when building and developing the devops workflow to implement ci/cd processesDescribe the implementation of continuous security in devops pipelines, with a focus on test-driven development, monitoring, responding to attacks, assessing risks, and maturing securityRecognize the need for applying test-driven security on applications, infrastructure, and automated devops pipelinesDescribe components that can be used to build logging and auditing pipelines
-
Recall the tools and processes that can be used to apply security for devops-compliant processes in order to manage intrusion and incident responsesControl permissions granted to users in github and manage permissions in docker hubConfigure jenkins security features to secure continuous build pipelinesRecognize the steps involved in implementing mature a devops security model that can help assess risks and facilitate continuous securitySummarize the key concepts covered in this course
IN THIS COURSE
-
2m 28s
-
10m 44sUpon completion of this video, you will be able to describe the policy requirements and guidelines that set the implementation standard for the security requirements specified in the baseline IT security policy. FREE ACCESS
-
4m 31sUpon completion of this video, you will be able to recognize the role of security in DevOps when building and developing the DevOps workflow to implement CI/CD processes. FREE ACCESS
-
5m 47sAfter completing this video, you will be able to describe the implementation of continuous security in DevOps pipelines, with a focus on test-driven development, monitoring, responding to attacks, assessing risks, and maturing security. FREE ACCESS
-
6m 29sAfter completing this video, you will be able to recognize the need for applying security to applications, infrastructure, and automated DevOps pipelines. FREE ACCESS
-
3m 39sAfter completing this video, you will be able to describe components that can be used to build logging and auditing pipelines. FREE ACCESS
-
6m 4sUpon completion of this video, you will be able to recall the tools and processes that can be used to apply security for DevOps-compliant processes in order to manage intrusion and incident responses. FREE ACCESS
-
2m 56sIn this video, you will learn how to control permissions granted to users in GitHub and manage permissions in Docker Hub. FREE ACCESS
-
4m 16sLearn how to configure Jenkins security features to secure continuous build pipelines. FREE ACCESS
-
6m 30sUpon completion of this video, you will be able to recognize the steps involved in implementing a mature DevOps security model that can help assess risks and facilitate continuous security. FREE ACCESS
-
1m 32s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.