|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| 01 - Security Essentials.pdf |
9.79MB |
| 02 - Intro to DevSecOps.pdf |
9.05MB |
| 03 - App Vulnerability Scanning.pdf |
6.82MB |
| 04 - Vulnerability Management.pdf |
4.88MB |
| 05 - Vulnerability Scanning for App Dependencies.pdf |
4.23MB |
| 06 - Set up CD Pipeline.pdf |
5.66MB |
| 07 - Image Scanning.pdf |
7.23MB |
| 08 - AWS Cloud Security and Access Management.pdf |
4.68MB |
| 09 - Secure Continuous Deployment & DAST.pdf |
7.19MB |
| 10 - IaC and GitOps for DevSecOps.pdf |
7.18MB |
| 11 - Logging & Monitoring for Security.pdf |
7.54MB |
| 12.1-Kubernetes-Security-Overview.mp4 |
24.29MB |
| 12.2-Kubernetes-Security-Best-Practices.mp4 |
93.25MB |
| 12.3-Provision-AWS-EKS-Cluster.mp4 |
83.70MB |
| 12 - Introduction to Kubernetes Security.pdf |
4.03MB |
| 13.1-Chapter-Introduction.mp4 |
8.13MB |
| 13.2-Role-Based-Access-Control-_RBAC_.mp4 |
59.99MB |
| 13.3-IAM-Roles-and-K8s-Roles-How-it-works.mp4 |
37.65MB |
| 13.4-Configure-IAM-Roles-and-link-to-K8s-Roles-in-IaC.mp4 |
60.21MB |
| 13.5-Configure-K8s-Role-and-ClusterRole-in-IaC.mp4 |
100.39MB |
| 13.6-Review-and-Test-Access.mp4 |
89.53MB |
| 13.7-Summary-_-Wrap-Up.mp4 |
14.76MB |
| 13 - Kubernetes Access Management.pdf |
8.85MB |
| 14.1-Using-GitLab-OIDC-in-AWS.mp4 |
38.10MB |
| 14.2-Configure-Authentication-with-GitLab-Identity-Provider.mp4 |
43.15MB |
| 14.3-Pipeline-Configuration-for-establishing-a-secure-connection.mp4 |
81.66MB |
| 14.4-Terraform-Configuration-for-EKS-provisioning.mp4 |
105.72MB |
| 14.5-Summary-_-Wrap-Up.mp4 |
19.45MB |
| 14 - Secure IaC Pipeline for EKS Provisioning.pdf |
7.63MB |
| 15.1-Introduction-to-EKS-Blueprints.mp4 |
15.83MB |
| 15.2-Overview-of-EKS-Add-ons-we-install.mp4 |
36.14MB |
| 15.3-Configure-EKS-Add-ons.mp4 |
70.40MB |
| 15.4-Troubleshooting-_-Tuning-Autoscaler.mp4 |
68.48MB |
| 15.5-Access-Token-Expiration.mp4 |
6.13MB |
| 15 - EKS Blueprints.pdf |
9.86MB |
| 16.10-Create-CI-Pipeline-that-triggers-GitOps-Pipeline.mp4 |
29.62MB |
| 16.11-See-Whole-Automated-Workflow-in-Action.mp4 |
31.85MB |
| 16.1-Chapter-Overview.mp4 |
8.79MB |
| 16.2-ArgoCD-explained-_Part-1_-What_-Why-and-How.mp4 |
29.92MB |
| 16.3-ArgoCD-explained-_Part-2_-Benefits-and-Configuration.mp4 |
66.55MB |
| 16.4-Overview-of-CI-or-CD-Pipelines-to-Git-repositories.mp4 |
27.34MB |
| 16.5-Configure-ArgoCD-in-IaC-_Deploy-Argo-Part-1_.mp4 |
81.32MB |
| 16.6-IaC-Pipeline-Configuration-_Deploy-Argo-Part-2_.mp4 |
44.50MB |
| 16 7-Deployment-through-Pipeline-and-Access-Argo-UI- Deploy-Argo-Part-3 mp4 |
51.84MB |
| 16.8-K8s-Manifests-for-Microservices-App-using-Kustomize.mp4 |
75.07MB |
| 16.9-Create-GitOps-Pipeline-to-update-Kustomization-File.mp4 |
76.97MB |
| 16 - App Release Pipeline with ArgoCD.pdf |
11.03MB |
| 17.1-Why-Policy-as-Code.mp4 |
12.27MB |
| 17.2-Introduction-to-Open-Policy-Agent-_OPA_-and-OPA-Gatekeeper.mp4 |
29.85MB |
| 17.3-How-Gatekeeper-and-OPA-works.mp4 |
26.17MB |
| 17.4-Install-OPA-Gatekeeper-in-Cluster.mp4 |
29.90MB |
| 17.5-Defining-Policies.mp4 |
31.14MB |
| 17.6-Define-Policy-to-reject-NodePort-Service.mp4 |
108.40MB |
| 17.7-Define-Policy-to-reject-Privileged-Containers.mp4 |
62.91MB |
| 17.8-Summary.mp4 |
7.71MB |
| 17 - Policy as Code.pdf |
6.61MB |
| 18.1-Why-Secrets-Manager-are-needed.mp4 |
30.32MB |
| 18.2-Introduction-to-External-Secrets-Operator-in-K8s.mp4 |
10.56MB |
| 18.3-Capabilities-of-Secrets-Management-Tools.mp4 |
9.72MB |
| 18.4-Vault-Capabilities-_Vault-Deep-Dive-Part-1_.mp4 |
20.50MB |
| 18.5-How-Vault-works-_Vault-Deep-Dive-Part-2_.mp4 |
34.63MB |
| 18.6-Introduction-to-AWS-Secrets-Manager.mp4 |
13.14MB |
| 18.7-Deploy-External-Secrets-Controller-_Demo-Part-1_.mp4 |
45.45MB |
| 18.8-Create-SecretStore-and-ExternalSecret.mp4 |
61.43MB |
| 18.9-Use-Secret-in-Microservice-_Demo-Part-3_.mp4 |
17.38MB |
| 18 - Secrets Management.pdf |
9.43MB |
| 19.10-Wrap-Up.mp4 |
5.09MB |
| 19.1-Chapter-and-Demo-Overview.mp4 |
5.69MB |
| 19.2-Service-Mesh-and-Istio-What_-Why-and-How.mp4 |
52.27MB |
| 19.3-Install-Istio-in-K8s-cluster.mp4 |
91.55MB |
| 19.4-Configure-Traffic-Routing.mp4 |
86.77MB |
| 19.5-Configure-a-Secure-Gateway.mp4 |
57.80MB |
| 19.6-mTLS-Deep-Dive.mp4 |
76.24MB |
| 19.7-Authorization-in-Istio-Deep-Dive.mp4 |
47.19MB |
| 19.8-Istio-Policies-vs-K8s-Network-Policies.mp4 |
17.54MB |
| 19.9-Configure-Authorization-Policies.mp4 |
75.86MB |
| 19 - Service Mesh with Istio.pdf |
7.90MB |
| 1 - AWS Security Essentials (8 - AWS Cloud Security & Access Management).mp4 |
26.97MB |
| 1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning).mp4 |
69.62MB |
| 1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation).mp4 |
31.78MB |
| 1 - Introduction to Security (1 - Security Essentials).mp4 |
5.32MB |
| 1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps).mp4 |
38.28MB |
| 1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp4 |
8.10MB |
| 1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images).mp4 |
5.41MB |
| 1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deployment & DAST).mp4 |
27.93MB |
| 1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies).mp4 |
53.42MB |
| 1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp4 |
25.61MB |
| 1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp4 |
14.78MB |
| 1 - Why learn DevSecOps.mp4 |
9.27MB |
| 20.1-What-is-Compliance.mp4 |
13.33MB |
| 20.2-What-are-CIS-Benchmarks.mp4 |
41.62MB |
| 20.3-Why-Compliance-as-Code.mp4 |
8.13MB |
| 20.4-Demo-Overview-and-Introduction-to-AWS-Config.mp4 |
44.58MB |
| 20.5-Setting-up-AWS-Config-Rules.mp4 |
49.43MB |
| 20 6-Configure-Auto-Remediation-for-Insecure-Security-Groups-for-EC2-Instances mp4 |
63.94MB |
| 20.7-Configure-Auto-Remediation-for-CloudTrail-Logging_-if-switched-off.mp4 |
27.46MB |
| 20.8-Configure-Compliance-Rules-for-AWS-EKS-Service.mp4 |
41.75MB |
| 20.9-Wrap-Up.mp4 |
5.93MB |
| 20 - Compliance as Code.pdf |
6.69MB |
| 21.1-Why-DevSecOps-is-Important.mp4 |
96.08MB |
| 21.2-Driving-Cultural-Change-Real-World-Examples-of-Companies.mp4 |
232.31MB |
| 21 3-How-to-start-implementing-DevSecOps-in-Organizations- Practical-Tips mp4 |
402.59MB |
| 21.4-Final-Summary.-The-DevSecOps-Transformation.mp4 |
228.03MB |
| 22 -Apply-for-the-Certified-DevSecOps-Practitioner-credential- Digital-Badge mp4 |
57.60MB |
| 2 - Configure Automated Security Scanning in Application Image.mp4 |
64.14MB |
| 2 - Configure AWS Systems Manager for EC2 Server.mp4 |
41.49MB |
| 2 - Impact of Missing Security Insights.mp4 |
10.02MB |
| 2 - Importance of Security & Impact of Security Breaches.mp4 |
48.12MB |
| 2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4 |
42.59MB |
| 2 - Introduction to CloudTrail and CloudWatch.mp4 |
14.98MB |
| 2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4 |
100.92MB |
| 2 - Introduction to Security Layers for AWS Access.mp4 |
30.22MB |
| 2 - Pre-Requisites of Bootcamp.mp4 |
11.25MB |
| 2 - Terraform Script for AWS Infrastructure Provisioning.mp4 |
61.21MB |
| 2 - Understand AWS Access Management using IAM Service.mp4 |
7.24MB |
| 2 - Understand DevSecOps.mp4 |
45.26MB |
| 3 - Analyze & Fix Security Issues from Findings in Application Image.mp4 |
79.65MB |
| 3 - Automate Uploading Security Scan Results to DefectDojo.mp4 |
102.12MB |
| 3 - AWS SSM Commands in Release Pipeline for Server Access.mp4 |
46.16MB |
| 3 - CloudTrail Event History.mp4 |
32.32MB |
| 3 - DevSecOps Bootcamp Curriculum Overview.mp4 |
83.18MB |
| 3 - How to Secure Systems Against Attacks.mp4 |
12.77MB |
| 3 - Integrate CICD Pipeline with AWS ECR.mp4 |
70.02MB |
| 3 - Overview of Static Security Scans in CI Pipeline.mp4 |
4.09MB |
| 3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4 |
25.00MB |
| 3 - Roles & Responsibilities in DevSecOps.mp4 |
30.48MB |
| 3 - Secret Scanning with GitLeaks - Local Environment.mp4 |
49.76MB |
| 3 - Securing AWS Root User Account.mp4 |
23.79MB |
| 4 - Automate Uploading Image Scanning Results in DefectDojo.mp4 |
33.12MB |
| 4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4 |
37.31MB |
| 4 - Configure Application Deployment Environment on EC2 Server.mp4 |
35.76MB |
| 4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4 |
94.67MB |
| 4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4 |
63.12MB |
| 4 - IAM Users, Groups & Policies.mp4 |
27.03MB |
| 4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4 |
64.10MB |
| 4 - Secure Continuous Deployment to Server using SSM.mp4 |
65.44MB |
| 4 - Support and Other Bootcamp Materials.mp4 |
7.52MB |
| 4 - Types of Security Attacks - Part 1.mp4 |
74.16MB |
| 5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4 |
6.25MB |
| 5 - Configure Remote State for Terraform.mp4 |
27.14MB |
| 5 - Create CloudWatch Alarm for EC2 Instance.mp4 |
62.64MB |
| 5 - Deploy Application to EC2 Server with Release Pipeline.mp4 |
56.30MB |
| 5 - Docker Security Best Practices.mp4 |
38.50MB |
| 5 - False Positives & Fixing Security Vulnerabilities.mp4 |
61.74MB |
| 5 - Secure Access from CICD Pipeline to AWS.mp4 |
46.81MB |
| 5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp4 |
57.85MB |
| 5 - Types of Security Attacks - Part 2.mp4 |
73.24MB |
| 6 - Add Automated Security Scan to TF Infrastructure Code.mp4 |
35.59MB |
| 6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4 |
44.00MB |
| 6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4 |
56.14MB |
| 6 - Create Custom Metric Filter for Failed Login Metrics.mp4 |
41.44MB |
| 6 - Integrate SAST Scans in Release Pipeline.mp4 |
79.46MB |
| 6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4 |
10.37MB |
| 6 - OWASP top 10 - Part 1.mp4 |
105.52MB |
| 6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4 |
18.16MB |
| 7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4 |
82.74MB |
| 7 - Configure Alarm for Failed Login Attempts.mp4 |
36.11MB |
| 7 - Overview of Automated Application Code and Image Scanning Steps.mp4 |
2.97MB |
| 7 - Overview of IAM Resources & Secure Access Management in AWS.mp4 |
9.18MB |
| 7 - OWASP top 10 - Part 2.mp4 |
79.77MB |
| 7 - Understand Dynamic Application Security Testing (DAST).mp4 |
31.16MB |
| 7 - Understand IaC Concept Cattle vs Pets.mp4 |
10.80MB |
| 8 - Configure Automated DAST Scans in CICD Pipeline.mp4 |
72.80MB |
| 8 - Configure AWS Budgets for Monthly Usage Costs.mp4 |
22.54MB |
| 8 - Security in Layers.mp4 |
35.80MB |
| 9 - Complete Bootcamp Part 1 - Next Steps.mp4 |
4.55MB |
| 9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4 |
7.40MB |
| code.zip |
134.30MB |
| links.txt |
3.79KB |