Final Exam: Introduction to DevSecOps
Intermediate
- 1 video | 32s
- Includes Assessment
- Earns a Badge
Final Exam:Introduction to DevSecOps will test your knowledge and application of the topics presented throughout the Introduction to DevSecOps journey.
WHAT YOU WILL LEARN
-
Discuss the evolution and history of computer systemsprovide an overview of information security and how it impacts users and organizationsdiscuss the basic tenants of information security: confidentiality, integrity, and availabilitydiscuss physical security principles such as access, control, surveillance, and security testingrecognize different types of information security including application, cloud, and infrastructure securityoutline common information security risks including advanced persistent threats, insider threats, and ransomwareprovide an introduction of devops and describe how it can be leveraged by development and it teamslist key benefits of devops including speed, reliability, and collaborationoutline common devops practices including continuous integration, continuous delivery, and automationlist common challenges of adopting devopsprovide an overview of the devops lifecycledifferentiate between the waterfall model and the agile model for software developmentprovide an overview of the continuous integration phase of the devops lifecycleprovide an overview of the continuous testing phase of the devops lifecycleprovide an overview of the continuous deployment phase of the devops lifecyclediscuss the continuous operations phase of the devops lifecyclediscuss the continuous monitoring phase of the devops lifecyclediscuss factors that define devsecops as a methodology or frameworkprovide an overview of the three ways frameworkprovide an overview of the calms frameworkdiscuss reasons to integrate security into the application development lifecyclerecognize key differences between agile and devsecopsdiscuss considerations when migrating from devops lifecycle to devsecops lifecycleprovide an overview of continuous integration / continuous delivery (ci/cd)describe the fundamental elements of ci/cddiscuss security vulnerabilities associated with the threat modeling phase of the devsecops pipelinelist common devsecops security recommendations such as implementing secure coding guidelines, building security into applications, and validating input datadescribe security vulnerabilities associated to the scanning phase of the devsecops pipelinedifferentiate between on-premise and cloud solutions and discuss how devsecops can influence eachprovide an overview of on-premise software
-
discuss measures to ensure security in devopsprovide an overview of test-driven security and why it has become a pillar of the devsecops modelprovide an overview on how to build a positive devsecops culturedescribe how devsecops teams can effectively monitor and respond to security incidentsprovide an overview of aws services used for ci/cd including aws codebuild, aws codecommit, and aws codedeployoutline tools used for continuous testing in awsoutline approaches used to support digital transformation in aws using devsecopslist components required for a successful devsecops implementation in aws including code analysis, change management, compliance, threat modeling, and security trainingoutline common benefits of practicing devsecops in awsdiscuss how to build and deploy containers with azure pipelinesprovide an overview of the azure security center and discuss how it can provide unified security management across workloadsrecognize how to manage keys and secrets in azure using azure key vaultdescribe how to manage identities and access with azure addescribe how azure devops can help plan tasks, collaborate, and build and deploy applicationsdiscuss the secure-by-design foundation and how it can be used to improve risk managementrecognize how the gcp security operations suite can be used to detect, investigate, and respond to threatsoutline the five layers of gcp security including cloud infrastructure, products and services, security blueprint, blueprints for security posture, workload, and applications, and solution packagesdiscuss how gcp uses a hierarchy to organize resources allowing for greater job-specific accessdescribe how gcp enables organizations to implement a zero-trust approachprovide an overview of common security challenges presented by containers such as attack surface sizelist common goals of shifting toward devsecops including secure by design and secure by defaultdiscuss reasons why teams are adopting containersdifferentiate between kubernetes and docker container orchestration systemsdifferentiate between virtualization and containerization and explain key benefits provided by bothprovide an overview of static analysis security testing (sast), or static analysisdescribe dynamic analysis security testing (dast), or dynamic analysislist common sast and dast devsecops tools including bandit, sonarqube, lgtm, owasp zap, and arachnidescribe how vulnerability management is used to identify, evaluate, treat and report on security vulnerabilitiesprovide an overview of secrets management tools such as vault, torus, keywhiz, envkey, confidant, and aws secrets managerprovide an overview of vulnerability assessment tools such as openvas and docker bench
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.