Udemy - Ultimate DevSecOps Bootcamp by School of Devops

dkmdkm

U P L O A D E R
10b0ddeb23c395dd99e1ccdc5dce5d5f.webp

Free Download Udemy - Ultimate DevSecOps Bootcamp by School of Devops
Last updated 4/2025
Created by Gourav Shah
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Expert | Genre: eLearning | Language: English + subtitle | Duration: 147 Lectures ( 9h 37m ) | Size: 4 GB

Build Complete DevSecOps Pipeline with Container Based Delivery, CI/CD on Kubernetes with all Open Source Tools
What you'll learn
Understand the core principles of DevSecOps and how they integrate into modern software delivery pipelines.
Set up a complete learning environment using Google Cloud Platform, Kubernetes (GKE), and essential DevOps tools.
Build a secure CI/CD pipeline using Jenkins, Helm, Docker, and Kubernetes.
Implement Software Composition Analysis (SCA) using OWASP Dependency-Check, Pyraider, and Dependency-Track to identify and manage third-party risks.
Apply Static Application Security Testing (SAST) using tools like slscan and integrate them into your CI/CD pipeline.
Conduct Dynamic Application Security Testing (DAST) using OWASP ZAP during deployment stages to catch runtime vulnerabilities.
Harden container images using Dockle, Trivy, and multi-stage Dockerfiles to reduce the attack surface.
Manage sensitive credentials and enforce secure secrets injection using HashiCorp Vault with Kubernetes.
Enforce system-level compliance and infrastructure hardening using InSpec and Ansible as Compliance-as-Code tools.
Secure Kubernetes workloads by implementing security contexts, Pod security policies, resource limits, and runtime scanning tools like Falco.
Build and deploy AI/ML and containerized applications securely using GitOps practices with ArgoCD.
Automate runtime anomaly detection and remediation using Falco and Argo Workflows.
Understand the Software Bill of Materials (SBOM) and integrate SBOM generation into your pipeline.
Design an end-to-end secure DevOps pipeline for real-world applications, from code to production, with continuous security monitoring.
Requirements
Familiarity with DevOps concepts and basic CI/CD workflows is recommended.
Prior experience with Docker and Kubernetes is helpful but not mandatory.
Access to a GCP account or any cloud environment for hands-on labs.
No deep security knowledge required - everything is explained step by step.
Description
Are you building or deploying applications on Kubernetes? Whether you're a DevOps Engineer, Platform Engineer, or AI/ML Engineer, security can no longer be an afterthought.This hands-on DevSecOps Bootcamp will help you build secure, production-ready CI/CD pipelines using open-source tools and industry best practices. Learn how to integrate security across the software development lifecycle and ensure your applications are secure by design.We will walk you through step-by-step labs that combine Jenkins, Kubernetes, ArgoCD, Vault, Trivy, Falco, OWASP ZAP, and other essential tools used in modern DevSecOps workflows.This course is ideal for teams building cloud-native applications, AI/ML models, or any containerized workload that needs to be deployed securely at scale.What You Will Learn:Core DevSecOps principles and the secure software delivery lifecycleHow to build a CI/CD pipeline with Jenkins on KubernetesSoftware Composition Analysis (SCA) using OWASP Dependency-Check, Pyraider, and Dependency-TrackStatic and Dynamic Application Security Testing (SAST & DAST) using slscan and OWASP ZAPSecuring container images using Trivy, Dockle, and multi-stage DockerfilesEnforcing compliance as code using InSpec and AnsibleSecrets management using HashiCorp Vault and Kubernetes RBACRuntime security monitoring using Falco with automated response pipelinesSecure deployment workflows with GitOps using ArgoCD and KubernetesTools and Technologies You Will Use:Jenkins, Helm, Kubernetes (GKE), ArgoCDTrivy, Dockle, OWASP ZAP, slscan, PyraiderVault, InSpec, Ansible, Falco, Argo WorkflowsDocker, Kubernetes RBAC, GitHub, GitOpsWho Should Take This Course:DevOps and Cloud Engineers who want to add security to their toolbeltAI/ML Engineers deploying models and services on KubernetesPlatform Engineers managing modern microservices at scaleSecurity Engineers transitioning to DevSecOps practicesDevelopers building containerized applications for productionThis is not a theoretical course. You will be working on real-world labs and projects that simulate what modern engineering teams do to secure their software pipelines in production environments.Whether you're deploying a machine learning model, a microservice, or a SaaS product - this course will help you ensure that your deployments are secure, scalable, and compliant.
Who this course is for
DevOps, Cloud, and Platform Engineers looking to build secure delivery pipelines.
AI/ML Engineers deploying models and services on Kubernetes or in production environments.
Developers who want to integrate security into their DevOps workflows.
Security professionals and SREs transitioning into DevSecOps roles.
Anyone responsible for deploying, securing, and maintaining modern applications at scale.
Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar
537368816_que-es-udemy-analisis-opiniones.jpg

3.97 GB | 12min 37s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English


Files Included :
1 -Welcome to DevSecOps Bootcamp.mp4 (40.96 MB)
1 -Module Intro.mp4 (48.21 MB)
10 -Configuring RunAsUser and ServiceAccounts.mp4 (68.8 MB)
2 -Setting Up a Single Node Kubernetes Environment.mp4 (50.65 MB)
3 -Running CIS Benchmark Scans for Kubernetes.mp4 (62.07 MB)
4 -Hunting for Vulnerabilities with Kube Hunter.mp4 (56.12 MB)
5 -Scanning the Kubernetes Deployment Code with Kubesec.mp4 (47.29 MB)
6 -Defining Resource Constraints.mp4 (17.07 MB)
7 -Configuring the Security Context for a Pod.mp4 (112.16 MB)
8 -Mounting the Root Filesystem as Read-Only.mp4 (50.1 MB)
9 -Restricting Syscalls with Seccomp.mp4 (64.68 MB)
1 -Module Intro.mp4 (20 MB)
2 -Installing Vault Using Helm.mp4 (19.07 MB)
3 -Adding Secrets to the Vault.mp4 (23.82 MB)
4 -Writing Policy and Kubernetes RBAC.mp4 (47.2 MB)
5 -Injecting a Secret into the Pod.mp4 (30.19 MB)
6 -Troubleshooting the Vault Policy.mp4 (53.36 MB)
7 -Customizing Secrets using Templates.mp4 (26.64 MB)
8 -Rotating Secrets with Vault.mp4 (15.24 MB)
1 -Module Intro.mp4 (43.34 MB)
2 -Installing the Falco Runtime Security Engine.mp4 (35.08 MB)
3 -Detecting Runtime Anomalies.mp4 (61.37 MB)
4 -Adding Custom Application Rules.mp4 (62.71 MB)
5 -Building an Automated Response Engine.mp4 (57.51 MB)
6 -Deploying Argo Events and Workflow with Falco.mp4 (71.58 MB)
7 -Troubleshooting Falco on GKE.mp4 (50.62 MB)
8 -Examining Argo Workflow.mp4 (48.06 MB)
9 -Response Engine in Action.mp4 (47.05 MB)
1 -Module Intro.mp4 (22.11 MB)
1 -Module Intro.mp4 (65.33 MB)
2 -Launching a Kubernetes Cluster with GKE.mp4 (33.11 MB)
3 -Setting up Firewall Rules.mp4 (21.58 MB)
4 -Launching a Linux Development Environment.mp4 (76.89 MB)
5 -Configuring Google Cloud SDK and Kubectl.mp4 (76.83 MB)
6 -Install Helm Package Manager.mp4 (31.54 MB)
1 -Module Intro.mp4 (28.07 MB)
2 -Installing Jenkins with Helm.mp4 (58.9 MB)
3 -Configuring Jenkins.mp4 (32.46 MB)
4 -Analyzing the Jenkinsfile Pipeline as a Code.mp4 (50.96 MB)
5 -Launching a Simple DevOps Pipeline.mp4 (53.94 MB)
6 -Building an Image with Docker.mp4 (39.39 MB)
7 -Why use Kaniko to build Container Images.mp4 (45.8 MB)
8 -Adding the Image Build and Publish Stage to the Pipeline.mp4 (80.11 MB)
1 -Module Intro.mp4 (26.39 MB)
10 -Cleaning up.mp4 (43.22 MB)
2 -Using the Dependency Checker for SCA.mp4 (40.11 MB)
3 -Using Pyraider as a Python SCA.mp4 (37.05 MB)
4 -Adding the Software Composition Analysis (SCA) Stage to the Pipeline.mp4 (41.97 MB)
5 -Scanning Open Source Licenses.mp4 (43.19 MB)
6 -Setting up Dependency Tracker.mp4 (46.41 MB)
7 -Troubleshooting Kubernetes Resource Issues.mp4 (53.78 MB)
8 -Connecting Jenkins with Dependency Tracker.mp4 (46.03 MB)
9 -Adding SBOM Stage to the Pipeline.mp4 (57.15 MB)
1 -Module Intro.mp4 (31.92 MB)
2 -Using SCAN (slscan io).mp4 (76.98 MB)
3 -Adding the SAST Stage to the Pipeline.mp4 (45.9 MB)
4 -Configuring SCA to Fail.mp4 (44.78 MB)
5 -Fixing Dependency Issues.mp4 (29.39 MB)
6 -Updating the License Approval List.mp4 (60.81 MB)
1 -Module Intro.mp4 (27.06 MB)
2 -Linting Images with Dockle.mp4 (53.3 MB)
3 -Scanning Images for Vulnerabilities with Trivy.mp4 (52.9 MB)
4 -What Is a Multi-Stage Dockerfile.mp4 (34.81 MB)
5 -Securing Images with a Multi-Stage Dockerfile.mp4 (80.02 MB)
6 -Running a Container as Non Root.mp4 (33.64 MB)
7 -Configuring Health Checks.mp4 (45.57 MB)
8 -Adding Image Analysis to the Pipeline.mp4 (49.38 MB)
1 -Module Intro.mp4 (28.98 MB)
2 -Setting Up ArgoCD.mp4 (49.91 MB)
3 -Configuring the ArgoCD CLI.mp4 (32.92 MB)
4 -Kubernetes Deployment Objects.mp4 (19.05 MB)
5 -Generating Kubernetes YAML Manifests.mp4 (32.89 MB)
6 -Deploying to Kubernetes with ArgoCD.mp4 (39.52 MB)
7 -Authorizing Jenkins to Deploy Remotely with Argo.mp4 (55.37 MB)
8 -Adding an Automated Deploy Stage to the Jenkins Pipeline.mp4 (68.37 MB)
9 -DAST Scan with ZAP.mp4 (49.8 MB)
1 -Module Intro.mp4 (33.38 MB)
10 -Running Daily SecOps Pipeline.mp4 (51.88 MB)
2 -Compliance Scanning with InSpec.mp4 (71.82 MB)
3 -Using the DevSec Hardening Framework.mp4 (67.62 MB)
4 -Configuring the SSH Pipeline Steps Plugin.mp4 (87.72 MB)
5 -Troubleshooting SSH in the Pipeline.mp4 (36.74 MB)
6 -Adding the Compliance Scan to the Pipeline.mp4 (29.82 MB)
7 -Installing and Configuring Ansible.mp4 (35.01 MB)
8 -Enforcing Compliance Remediation with Ansible.mp4 (56.03 MB)
9 -Modifying InSpec Controls.mp4 (51.5 MB)
]
Screenshot
uj85JSxP_o.jpg


RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
NitroFlare
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten