Important DevSecOps Tools
DevSecOps
| Intermediate
- 15 videos | 1h 18m 21s
- Includes Assessment
- Earns a Badge
DevSecOps stands for development, security, and operations, and is used to inject security earlier in the software development life cycle (SDLC). In this course, you will explore the various categories of DevSecOps, starting with static analysis security testing (SAST) and dynamic analysis security testing (DAST). Next, you will discover common SAST and DAST DevSecOps tools including Bandit, Clean Code, looks good to me (LGTM), OWASP Zed Attack Proxy (ZAP), and Nikto, and examine dependency analysis and related dependency analysis tools. Then, you will investigate infrastructure as code (IaC) security and the leading IaC security tools, including Anchore, Clair, Dagda, OpenSCAP, dockscan, and InSpec. Finally, you will find out how secrets management is used to manage passwords, keys, application programming interfaces (APIs), and tokens, and you will identify the benefits of vulnerability management and assessment practices.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of sast, or static analysisDescribe dast, or dynamic analysisList common sast and dast devsecops tools, including bandit, clean code, looks good to me (lgtm), owasp zed attack proxy (zap), and niktoDefine dependency analysis and describe how it is used to analyze dependencies between activitiesProvide an overview of dependency analysis tools, including the open worldwide application security project (owasp), github dependabot, sonatype, and retire.jsProvide an overview of iac securityList common iac security tools, including anchore, clair, dagda, openscap, dockscan, and chef inspec
-
Describe how secrets management is used to manage passwords, keys, application programming interfaces (apis), and tokensProvide an overview of secrets management tools such as vault, torus, keywhiz, envkey, confidant, and aws secrets managerDescribe how vulnerability management is used to identify, evaluate, treat, and report on security vulnerabilitiesProvide an overview of vulnerability management tools, including jackhammer, defectdojo, and archerysecOutline how vulnerability assessment is used to identify and assess severity levels to security vulnerabilitiesProvide an overview of vulnerability assessment tools such as openvas and docker benchSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 11sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
5m 41sAfter completing this video, you will be able to provide an overview of SAST, or static analysis. FREE ACCESS
-
5m 56sUpon completion of this video, you will be able to describe DAST, or dynamic analysis. FREE ACCESS
-
6m 33sAfter completing this video, you will be able to list common SAST and DAST DevSecOps tools, including Bandit, Clean Code, looks good to me (LGTM), OWASP Zed Attack Proxy (ZAP), and Nikto. FREE ACCESS
-
5m 31sUpon completion of this video, you will be able to define dependency analysis and describe how it is used to analyze dependencies between activities. FREE ACCESS
-
5m 42sAfter completing this video, you will be able to provide an overview of dependency analysis tools, including the Open Worldwide Application Security Project (OWASP), GitHub Dependabot, Sonatype, and Retire.js. FREE ACCESS
-
5m 40sUpon completion of this video, you will be able to provide an overview of IaC security. FREE ACCESS
-
5m 52sIn this video, we will list common IaC security tools, including Anchore, Clair, Dagda, OpenSCAP, dockscan, and Chef InSpec. FREE ACCESS
-
5m 50sAfter completing this video, you will be able to describe how secrets management is used to manage passwords, keys, application programming interfaces (APIs), and tokens. FREE ACCESS
-
5m 47sUpon completion of this video, you will be able to provide an overview of secrets management tools such as Vault, Torus, Keywhiz, EnvKey, Confidant, and AWS Secrets Manager. FREE ACCESS
-
5m 54sAfter completing this video, you will be able to describe how vulnerability management is used to identify, evaluate, treat, and report on security vulnerabilities. FREE ACCESS
-
5m 55sUpon completion of this video, you will be able to provide an overview of vulnerability management tools, including Jackhammer, DefectDojo, and ArcherySec. FREE ACCESS
-
6m 12sAfter completing this video, you will be able to outline how vulnerability assessment is used to identify and assess severity levels to security vulnerabilities. FREE ACCESS
-
6m 5sUpon completion of this video, you will be able to provide an overview of vulnerability assessment tools such as OpenVAS and Docker Bench. FREE ACCESS
-
32sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.