Torrent Info
Title techworld-with-nana - devsecops-bootcamp-video
Category XXX
Size 7.14GB
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
01 - Security Essentials.pdf 9.79MB
02 - Intro to DevSecOps.pdf 9.05MB
03 - App Vulnerability Scanning.pdf 6.82MB
04 - Vulnerability Management.pdf 4.88MB
05 - Vulnerability Scanning for App Dependencies.pdf 4.23MB
06 - Set up CD Pipeline.pdf 5.66MB
07 - Image Scanning.pdf 7.23MB
08 - AWS Cloud Security and Access Management.pdf 4.68MB
09 - Secure Continuous Deployment & DAST.pdf 7.19MB
10 - IaC and GitOps for DevSecOps.pdf 7.18MB
11 - Logging & Monitoring for Security.pdf 7.54MB
12.1-Kubernetes-Security-Overview.mp4 24.29MB
12.2-Kubernetes-Security-Best-Practices.mp4 93.25MB
12.3-Provision-AWS-EKS-Cluster.mp4 83.70MB
12 - Introduction to Kubernetes Security.pdf 4.03MB
13.1-Chapter-Introduction.mp4 8.13MB
13.2-Role-Based-Access-Control-_RBAC_.mp4 59.99MB
13.3-IAM-Roles-and-K8s-Roles-How-it-works.mp4 37.65MB
13.4-Configure-IAM-Roles-and-link-to-K8s-Roles-in-IaC.mp4 60.21MB
13.5-Configure-K8s-Role-and-ClusterRole-in-IaC.mp4 100.39MB
13.6-Review-and-Test-Access.mp4 89.53MB
13.7-Summary-_-Wrap-Up.mp4 14.76MB
13 - Kubernetes Access Management.pdf 8.85MB
14.1-Using-GitLab-OIDC-in-AWS.mp4 38.10MB
14.2-Configure-Authentication-with-GitLab-Identity-Provider.mp4 43.15MB
14.3-Pipeline-Configuration-for-establishing-a-secure-connection.mp4 81.66MB
14.4-Terraform-Configuration-for-EKS-provisioning.mp4 105.72MB
14.5-Summary-_-Wrap-Up.mp4 19.45MB
14 - Secure IaC Pipeline for EKS Provisioning.pdf 7.63MB
15.1-Introduction-to-EKS-Blueprints.mp4 15.83MB
15.2-Overview-of-EKS-Add-ons-we-install.mp4 36.14MB
15.3-Configure-EKS-Add-ons.mp4 70.40MB
15.4-Troubleshooting-_-Tuning-Autoscaler.mp4 68.48MB
15.5-Access-Token-Expiration.mp4 6.13MB
15 - EKS Blueprints.pdf 9.86MB
16.10-Create-CI-Pipeline-that-triggers-GitOps-Pipeline.mp4 29.62MB
16.11-See-Whole-Automated-Workflow-in-Action.mp4 31.85MB
16.1-Chapter-Overview.mp4 8.79MB
16.2-ArgoCD-explained-_Part-1_-What_-Why-and-How.mp4 29.92MB
16.3-ArgoCD-explained-_Part-2_-Benefits-and-Configuration.mp4 66.55MB
16.4-Overview-of-CI-or-CD-Pipelines-to-Git-repositories.mp4 27.34MB
16.5-Configure-ArgoCD-in-IaC-_Deploy-Argo-Part-1_.mp4 81.32MB
16.6-IaC-Pipeline-Configuration-_Deploy-Argo-Part-2_.mp4 44.50MB
16 7-Deployment-through-Pipeline-and-Access-Argo-UI- Deploy-Argo-Part-3 mp4 51.84MB
16.8-K8s-Manifests-for-Microservices-App-using-Kustomize.mp4 75.07MB
16.9-Create-GitOps-Pipeline-to-update-Kustomization-File.mp4 76.97MB
16 - App Release Pipeline with ArgoCD.pdf 11.03MB
17.1-Why-Policy-as-Code.mp4 12.27MB
17.2-Introduction-to-Open-Policy-Agent-_OPA_-and-OPA-Gatekeeper.mp4 29.85MB
17.3-How-Gatekeeper-and-OPA-works.mp4 26.17MB
17.4-Install-OPA-Gatekeeper-in-Cluster.mp4 29.90MB
17.5-Defining-Policies.mp4 31.14MB
17.6-Define-Policy-to-reject-NodePort-Service.mp4 108.40MB
17.7-Define-Policy-to-reject-Privileged-Containers.mp4 62.91MB
17.8-Summary.mp4 7.71MB
17 - Policy as Code.pdf 6.61MB
18.1-Why-Secrets-Manager-are-needed.mp4 30.32MB
18.2-Introduction-to-External-Secrets-Operator-in-K8s.mp4 10.56MB
18.3-Capabilities-of-Secrets-Management-Tools.mp4 9.72MB
18.4-Vault-Capabilities-_Vault-Deep-Dive-Part-1_.mp4 20.50MB
18.5-How-Vault-works-_Vault-Deep-Dive-Part-2_.mp4 34.63MB
18.6-Introduction-to-AWS-Secrets-Manager.mp4 13.14MB
18.7-Deploy-External-Secrets-Controller-_Demo-Part-1_.mp4 45.45MB
18.8-Create-SecretStore-and-ExternalSecret.mp4 61.43MB
18.9-Use-Secret-in-Microservice-_Demo-Part-3_.mp4 17.38MB
18 - Secrets Management.pdf 9.43MB
19.10-Wrap-Up.mp4 5.09MB
19.1-Chapter-and-Demo-Overview.mp4 5.69MB
19.2-Service-Mesh-and-Istio-What_-Why-and-How.mp4 52.27MB
19.3-Install-Istio-in-K8s-cluster.mp4 91.55MB
19.4-Configure-Traffic-Routing.mp4 86.77MB
19.5-Configure-a-Secure-Gateway.mp4 57.80MB
19.6-mTLS-Deep-Dive.mp4 76.24MB
19.7-Authorization-in-Istio-Deep-Dive.mp4 47.19MB
19.8-Istio-Policies-vs-K8s-Network-Policies.mp4 17.54MB
19.9-Configure-Authorization-Policies.mp4 75.86MB
19 - Service Mesh with Istio.pdf 7.90MB
1 - AWS Security Essentials (8 - AWS Cloud Security & Access Management).mp4 26.97MB
1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning).mp4 69.62MB
1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation).mp4 31.78MB
1 - Introduction to Security (1 - Security Essentials).mp4 5.32MB
1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps).mp4 38.28MB
1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp4 8.10MB
1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images).mp4 5.41MB
1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deployment & DAST).mp4 27.93MB
1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies).mp4 53.42MB
1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp4 25.61MB
1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp4 14.78MB
1 - Why learn DevSecOps.mp4 9.27MB
20.1-What-is-Compliance.mp4 13.33MB
20.2-What-are-CIS-Benchmarks.mp4 41.62MB
20.3-Why-Compliance-as-Code.mp4 8.13MB
20.4-Demo-Overview-and-Introduction-to-AWS-Config.mp4 44.58MB
20.5-Setting-up-AWS-Config-Rules.mp4 49.43MB
20 6-Configure-Auto-Remediation-for-Insecure-Security-Groups-for-EC2-Instances mp4 63.94MB
20.7-Configure-Auto-Remediation-for-CloudTrail-Logging_-if-switched-off.mp4 27.46MB
20.8-Configure-Compliance-Rules-for-AWS-EKS-Service.mp4 41.75MB
20.9-Wrap-Up.mp4 5.93MB
20 - Compliance as Code.pdf 6.69MB
21.1-Why-DevSecOps-is-Important.mp4 96.08MB
21.2-Driving-Cultural-Change-Real-World-Examples-of-Companies.mp4 232.31MB
21 3-How-to-start-implementing-DevSecOps-in-Organizations- Practical-Tips mp4 402.59MB
21.4-Final-Summary.-The-DevSecOps-Transformation.mp4 228.03MB
22 -Apply-for-the-Certified-DevSecOps-Practitioner-credential- Digital-Badge mp4 57.60MB
2 - Configure Automated Security Scanning in Application Image.mp4 64.14MB
2 - Configure AWS Systems Manager for EC2 Server.mp4 41.49MB
2 - Impact of Missing Security Insights.mp4 10.02MB
2 - Importance of Security & Impact of Security Breaches.mp4 48.12MB
2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4 42.59MB
2 - Introduction to CloudTrail and CloudWatch.mp4 14.98MB
2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4 100.92MB
2 - Introduction to Security Layers for AWS Access.mp4 30.22MB
2 - Pre-Requisites of Bootcamp.mp4 11.25MB
2 - Terraform Script for AWS Infrastructure Provisioning.mp4 61.21MB
2 - Understand AWS Access Management using IAM Service.mp4 7.24MB
2 - Understand DevSecOps.mp4 45.26MB
3 - Analyze & Fix Security Issues from Findings in Application Image.mp4 79.65MB
3 - Automate Uploading Security Scan Results to DefectDojo.mp4 102.12MB
3 - AWS SSM Commands in Release Pipeline for Server Access.mp4 46.16MB
3 - CloudTrail Event History.mp4 32.32MB
3 - DevSecOps Bootcamp Curriculum Overview.mp4 83.18MB
3 - How to Secure Systems Against Attacks.mp4 12.77MB
3 - Integrate CICD Pipeline with AWS ECR.mp4 70.02MB
3 - Overview of Static Security Scans in CI Pipeline.mp4 4.09MB
3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4 25.00MB
3 - Roles & Responsibilities in DevSecOps.mp4 30.48MB
3 - Secret Scanning with GitLeaks - Local Environment.mp4 49.76MB
3 - Securing AWS Root User Account.mp4 23.79MB
4 - Automate Uploading Image Scanning Results in DefectDojo.mp4 33.12MB
4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4 37.31MB
4 - Configure Application Deployment Environment on EC2 Server.mp4 35.76MB
4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4 94.67MB
4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4 63.12MB
4 - IAM Users, Groups & Policies.mp4 27.03MB
4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4 64.10MB
4 - Secure Continuous Deployment to Server using SSM.mp4 65.44MB
4 - Support and Other Bootcamp Materials.mp4 7.52MB
4 - Types of Security Attacks - Part 1.mp4 74.16MB
5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4 6.25MB
5 - Configure Remote State for Terraform.mp4 27.14MB
5 - Create CloudWatch Alarm for EC2 Instance.mp4 62.64MB
5 - Deploy Application to EC2 Server with Release Pipeline.mp4 56.30MB
5 - Docker Security Best Practices.mp4 38.50MB
5 - False Positives & Fixing Security Vulnerabilities.mp4 61.74MB
5 - Secure Access from CICD Pipeline to AWS.mp4 46.81MB
5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp4 57.85MB
5 - Types of Security Attacks - Part 2.mp4 73.24MB
6 - Add Automated Security Scan to TF Infrastructure Code.mp4 35.59MB
6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4 44.00MB
6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4 56.14MB
6 - Create Custom Metric Filter for Failed Login Metrics.mp4 41.44MB
6 - Integrate SAST Scans in Release Pipeline.mp4 79.46MB
6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4 10.37MB
6 - OWASP top 10 - Part 1.mp4 105.52MB
6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4 18.16MB
7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4 82.74MB
7 - Configure Alarm for Failed Login Attempts.mp4 36.11MB
7 - Overview of Automated Application Code and Image Scanning Steps.mp4 2.97MB
7 - Overview of IAM Resources & Secure Access Management in AWS.mp4 9.18MB
7 - OWASP top 10 - Part 2.mp4 79.77MB
7 - Understand Dynamic Application Security Testing (DAST).mp4 31.16MB
7 - Understand IaC Concept Cattle vs Pets.mp4 10.80MB
8 - Configure Automated DAST Scans in CICD Pipeline.mp4 72.80MB
8 - Configure AWS Budgets for Monthly Usage Costs.mp4 22.54MB
8 - Security in Layers.mp4 35.80MB
9 - Complete Bootcamp Part 1 - Next Steps.mp4 4.55MB
9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4 7.40MB
code.zip 134.30MB
links.txt 3.79KB
Distribution statistics by country
Russia (RU) 15
Poland (PL) 2
Ukraine (UA) 2
Republic of Moldova (MD) 2
United Kingdom (GB) 2
Bulgaria (BG) 2
Spain (ES) 1
Kazakhstan (KZ) 1
Azerbaijan (AZ) 1
Vietnam (VN) 1
India (IN) 1
Belarus (BY) 1
New Zealand (NZ) 1
Serbia (RS) 1
China (CN) 1
Estonia (EE) 1
Total 35
IP List List of IP addresses which were distributed this torrent