Security Principles for DevSecOps

DevSecOps    |    Beginner
  • 15 videos | 2h 14m 3s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 5 users Rating 5.0 of 5 users (5)
Computer systems and the Internet have changed the way the world does everyday activities. These innovations allow people and businesses to be more connected and accessible than ever before. However, as the Internet evolved, so did Internet security threats, including the sophistication of Internet scams and attacks. In this course, you will explore the history of computer systems and the Internet and discover the basic tenants of information security: confidentiality, integrity, and availability. You will discover different types of information security including application, cloud, and infrastructure security and explore information security risks including advanced persistent threats, insider threats, and ransomware. You will also learn to differentiate between InfoSec, cybersecurity, and DevSecOps. Finally, you will explore common benefits of DevSecOps, including delivery and security.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the evolution and history of computer systems
    Provide an overview of information security and how it impacts users and organizations
    Outline the basic tenants of information security: confidentiality, integrity , and availability
    Provide an overview of physical security principles such as access, control, surveillance, and security testing
    Recognize different types of information security including application, cloud, and infrastructure security
    Outline common information security risks including advanced persistent threats, insider threats, and ransomware
    Recognize common information security technologies including firewalls, data loss prevention, intrusion prevention, and endpoint detection and response
  • Provide an overview of the history of the internet over the years
    Differentiate between active and passive attacks
    Recognize the importance of data protection laws and how they might differ depending on the region
    Differentiate between infosec, cybersecurity, and devsecops
    Differentiate between devops and devsecops
    Identify common benefits of devsecops including delivery and security
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 15s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 14m 12s
    After completing this video, you will be able to outline the evolution and history of computer systems. FREE ACCESS
  • Locked
    3.  Information Security
    9m 30s
    Upon completion of this video, you will be able to provide an overview of information security and how it impacts users and organizations. FREE ACCESS
  • Locked
    4.  Principles of Information Security
    9m 47s
    After completing this video, you will be able to outline the basic tenants of information security: confidentiality, integrity , and availability. FREE ACCESS
  • Locked
    5.  Physical Security
    10m 12s
    Upon completion of this video, you will be able to provide an overview of physical security principles such as access, control, surveillance, and security testing. FREE ACCESS
  • Locked
    6.  Types of Information Security
    10m 18s
    After completing this video, you will be able to recognize different types of information security including application, cloud, and infrastructure security. FREE ACCESS
  • Locked
    7.  Information Security Risks
    10m 7s
    Upon completion of this video, you will be able to outline common information security risks including advanced persistent threats, insider threats, and ransomware. FREE ACCESS
  • Locked
    8.  Information Security Technologies
    10m 5s
    After completing this video, you will be able to recognize common information security technologies including firewalls, data loss prevention, intrusion prevention, and endpoint detection and response. FREE ACCESS
  • Locked
    9.  History of the Internet
    10m 55s
    Upon completion of this video, you will be able to provide an overview of the history of the internet over the years. FREE ACCESS
  • Locked
    10.  Active vs. Passive Attacks
    10m 12s
    After completing this video, you will be able to differentiate between active and passive attacks. FREE ACCESS
  • Locked
    11.  Data Protection Laws
    11m 37s
    Upon completion of this video, you will be able to recognize the importance of data protection laws and how they might differ depending on the region. FREE ACCESS
  • Locked
    12.  InfoSec vs. Cybersecurity vs DevSecOps
    7m 35s
    After completing this video, you will be able to differentiate between InfoSec, cybersecurity, and DevSecOps. FREE ACCESS
  • Locked
    13.  DevOps vs. DevSecOps
    8m 5s
    Upon completion of this video, you will be able to differentiate between DevOps and DevSecOps. FREE ACCESS
  • Locked
    14.  Benefits of DevSecOps
    9m 16s
    After completing this video, you will be able to identify common benefits of DevSecOps including delivery and security. FREE ACCESS
  • Locked
    15.  Course Summary
    57s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 7 users Rating 4.3 of 7 users (7)
Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
Rating 4.2 of 50 users Rating 4.2 of 50 users (50)