:Search:

DevSecOps Bootcamp FreeCourseWeb

Torrent:
Info Hash: 09B1C4B69433EA9B95AC4478C6B510850FC05CAD
Thumbnail:
Similar Posts:
Uploader: FreeCourseWeb
Source: T Logo Torrent Galaxy
Downloads: 174
Language: English
Category: Other
Size: 3.1 GB
Added: Nov. 30, 2023, 5:31 p.m.
Peers: Seeders: 10, Leechers: 0 (Last updated: 11 months ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 0 0
udp://exodus.desync.com:6969/announce 2 0 7
udp://tracker.cyberia.is:6969/announce 1 0 2
udp://tracker.opentrackr.org:1337/announce 2 0 159
udp://tracker.torrent.eu.org:451/announce 2 0 2
udp://explodie.org:6969/announce 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 0 0 4
udp://tracker.rarbg.torrentbay.st:6969/announce 0 0 0
Files:
  1. Get Bonus Downloads Here.url 183 bytes
  2. 1 - Why learn DevSecOps.mp4 9.3 MB
  3. 2 - Pre-Requisites of Bootcamp.mp4 11.3 MB
  4. 3 - DevSecOps Bootcamp Curriculum Overview.mp4 83.2 MB
  5. 4 - Support and Other Bootcamp Materials.mp4 7.5 MB
  6. 5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4 6.3 MB
  7. 01 - Security Essentials.pdf 9.8 MB
  8. 02 - Intro to DevSecOps.pdf 9.0 MB
  9. 03 - App Vulnerability Scanning.pdf 6.8 MB
  10. 04 - Vulnerability Management.pdf 4.9 MB
  11. 05 - Vulnerability Scanning for App Dependencies.pdf 4.2 MB
  12. 06 - Set up CD Pipeline.pdf 5.7 MB
  13. 07 - Image Scanning.pdf 7.2 MB
  14. 08 - AWS Cloud Security and Access Management.pdf 4.7 MB
  15. 09 - Secure Continuous Deployment & DAST.pdf 7.2 MB
  16. 1 - Introduction to Security (1 - Security Essentials).mp4 5.3 MB
  17. 2 - Importance of Security & Impact of Security Breaches.mp4 48.1 MB
  18. 3 - How to Secure Systems Against Attacks.mp4 12.8 MB
  19. 4 - Types of Security Attacks - Part 1.mp4 74.2 MB
  20. 5 - Types of Security Attacks - Part 2.mp4 73.2 MB
  21. 6 - OWASP top 10 - Part 1.mp4 105.5 MB
  22. 7 - OWASP top 10 - Part 2.mp4 79.8 MB
  23. 8 - Security in Layers.mp4 35.8 MB
  24. 10 - IaC and GitOps for DevSecOps.pdf 7.2 MB
  25. 1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp4 25.6 MB
  26. 2 - Terraform Script for AWS Infrastructure Provisioning.mp4 61.2 MB
  27. 3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4 25.0 MB
  28. 4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4 37.3 MB
  29. 5 - Configure Remote State for Terraform.mp4 27.1 MB
  30. 6 - Add Automated Security Scan to TF Infrastructure Code.mp4 35.6 MB
  31. 7 - Understand IaC Concept Cattle vs Pets.mp4 10.8 MB
  32. 11 - Logging & Monitoring for Security.pdf 7.5 MB
  33. 1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp4 14.8 MB
  34. 2 - Introduction to CloudTrail and CloudWatch.mp4 15.0 MB
  35. 3 - CloudTrail Event History.mp4 32.3 MB
  36. 4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4 94.7 MB
  37. 5 - Create CloudWatch Alarm for EC2 Instance.mp4 62.6 MB
  38. 6 - Create Custom Metric Filter for Failed Login Metrics.mp4 41.4 MB
  39. 7 - Configure Alarm for Failed Login Attempts.mp4 36.1 MB
  40. 8 - Configure AWS Budgets for Monthly Usage Costs.mp4 22.5 MB
  41. 9 - Complete Bootcamp Part 1 - Next Steps.mp4 4.6 MB
  42. 1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps).mp4 38.3 MB
  43. 2 - Understand DevSecOps.mp4 45.3 MB
  44. 3 - Roles & Responsibilities in DevSecOps.mp4 30.5 MB
  45. 1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning).mp4 69.6 MB
  46. 2 - Impact of Missing Security Insights.mp4 10.0 MB
  47. 3 - Secret Scanning with GitLeaks - Local Environment.mp4 49.8 MB
  48. 4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4 64.1 MB
  49. 5 - False Positives & Fixing Security Vulnerabilities.mp4 61.7 MB
  50. 6 - Integrate SAST Scans in Release Pipeline.mp4 79.5 MB
  51. 1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation).mp4 31.8 MB
  52. 2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4 100.9 MB
  53. 3 - Automate Uploading Security Scan Results to DefectDojo.mp4 102.1 MB
  54. 4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4 63.1 MB
  55. 1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies).mp4 53.4 MB
  56. 2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4 42.6 MB
  57. 3 - Overview of Static Security Scans in CI Pipeline.mp4 4.1 MB
  58. 1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp4 8.1 MB
  59. 2 - Introduction to Security Layers for AWS Access.mp4 30.2 MB
  60. 3 - Integrate CICD Pipeline with AWS ECR.mp4 70.0 MB
  61. 4 - Configure Application Deployment Environment on EC2 Server.mp4 35.8 MB
  62. 5 - Deploy Application to EC2 Server with Release Pipeline.mp4 56.3 MB
  63. 6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4 56.1 MB
  64. 7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4 82.7 MB
  65. 1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images).mp4 5.4 MB
  66. 2 - Configure Automated Security Scanning in Application Image.mp4 64.1 MB
  67. 3 - Analyze & Fix Security Issues from Findings in Application Image.mp4 79.6 MB
  68. 4 - Automate Uploading Image Scanning Results in DefectDojo.mp4 33.1 MB
  69. 5 - Docker Security Best Practices.mp4 38.5 MB
  70. 6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4 44.0 MB
  71. 7 - Overview of Automated Application Code and Image Scanning Steps.mp4 3.0 MB
  72. 1 - AWS Security Essentials (8 - AWS Cloud Security & Access Management).mp4 27.0 MB
  73. 2 - Understand AWS Access Management using IAM Service.mp4 7.2 MB
  74. 3 - Securing AWS Root User Account.mp4 23.8 MB
  75. 4 - IAM Users, Groups & Policies.mp4 27.0 MB
  76. 5 - Secure Access from CICD Pipeline to AWS.mp4 46.8 MB
  77. 6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4 18.2 MB
  78. 7 - Overview of IAM Resources & Secure Access Management in AWS.mp4 9.2 MB
  79. 1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deployment & DAST).mp4 27.9 MB
  80. 2 - Configure AWS Systems Manager for EC2 Server.mp4 41.5 MB
  81. 3 - AWS SSM Commands in Release Pipeline for Server Access.mp4 46.2 MB
  82. 4 - Secure Continuous Deployment to Server using SSM.mp4 65.4 MB
  83. 5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp4 57.8 MB
  84. 6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4 10.4 MB
  85. 7 - Understand Dynamic Application Security Testing (DAST).mp4 31.2 MB
  86. 8 - Configure Automated DAST Scans in CICD Pipeline.mp4 72.8 MB
  87. 9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4 7.4 MB
  88. Bonus Resources.txt 386 bytes
  89. DevSpecOps Bootcamp.txt 4.4 KB
  90. links.txt 3.8 KB

Discussion