DevOps: Configuration Management, CI/CD, Monitoring-Security

4.2 (15)
Онлайн-курс
Payment
Обучение платное
Language
Not set
Duration
5 часов курса
Курс от Udemy
Чему вы научились?
Implement DevOps using a Docker container
Explore continuous integration tools and different configuration management tools.
Explore Container orchestration with best practices and implement security solutions in the DevOps cycle.
Integrate Security into Continuous Delivery workflows for continuous security.
Leverage Infrastructure as Code techniques for secure configuration management and provisioning.
Eliminate manual security practices such as risk assessments and audits by automating all the verification.
Build a better defense mechanism by the use of Red and Blue teams.
Create automatic compliance by using the DevOps Audit Defense Toolkit.
Build continuous a feedback loop by automating all security checks throughout the Continuous Delivery pipeline.
О курсе

If continuous security in development lifecycle like configuration checks, code analysis, vulnerability scanning etc. is not adequately automated then it leads to increased security violations and hacking/phishing attacks. DevOps enables rapid application development and follows a traditional way of performing security checks. It helps an organization deploy software while maintaining service stability. If you’re looking to protect your organization with the collaboration of DevOps and security then is the perfect Course for you!

This comprehensive 2-in-1 course takes a step-by-step practical approach to protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework. You’ll initially implement a complete DevOps cycle with use cases as well as implement DevOps using a Docker container. You’ll explore continuous integration tools and different configuration management tools using Chef, puppet, and Ansible. Moving further, you’ll create automatic compliance by using the DevOps Audit Defense Toolkit. Finally, you’ll build a continuous feedback loop by automating all security checks throughout the Continuous Delivery pipeline.

Towards the end of this course, you'll protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework.

Contents and Overview

This training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible.

The first course, Professional DevOps, covers DevOps tools and technology frameworks to implement DevOps for your organization. This course helps you implement a complete DevOps cycle in your existing IT environment. Each section of this course will help you implement the DevOps culture in your professional environment. With the help of source control, continuous build, continuous integration, automated test with quality controls, and container technologies, this course will be your perfect guide to learn and apply DevOps in your organization. By the end of this course, you’ll be able to identify and choose the appropriate tools and technology framework to implement DevOps in your organization.

The second course, Practical DevOps Security, covers protecting your organization with the collaboration of DevOps and security. This course shows you how to apply DevOps security best practices at every stage in your DevOps pipeline. You will learn proven approaches to reducing vulnerability and strengthening your defenses against attack. You will understand using security as code with the intent of making security and compliance consumable as a service. This course explains how DevOps security practices differ from traditional security approaches and provide techniques to embed governance and cybersecurity functions throughout the DevOps workflow. By the end of the course, you will have learned best practices in DevSecOps, the core concepts of secure DevOps, and how security can be integrated into the development pipeline.

Towards the end of this course, you'll protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework.

About the Authors

Umar Murtaza has more than 25 years’ experience of System Administration in implementing, commissioning development, testing, and production environments. He has designed and implemented a number of DevOps environments, conducted 4- day hands-on DevOps training sessions at a number of private and government telecommunications and software companies/institutions.

Gurpreet Sachdeva is a Technology Executive with 21+ years' experience working on some of the most challenging technologies related to Cloud Computing, DevOps, and Security. Gurpreet did his B. Tech (C.S.) from NIT, Kurukshetra, and M.S. (Software Systems) from BITS, Pilani. He is currently working as Assistant Vice President—Technology with Aricent, Gurgaon. He is a keen Java enthusiast and co-founder of Delhi – NCR – Java User Group. Gurpreet is an invited speaker in prestigious conferences such as Oracle – Java One, Great India Developer Summit.

Требования
  • Basic understanding of DevOps, Cloud computing, automation frameworks, and programming skills would be beneficial. However, you need to have a basic understanding or working experience with Linux, and an understanding of the IT environment.
Лекторы
Packt Publishing
Packt Publishing
Tech Knowledge in Motion
Платформа
/storage/img/providers/udemy.svg
Курсы Udemy подойдут для профессионального развития. Платформа устроена таким образом, что эксперты сами запускают курсы. Все материалы передаются в пожизненный доступ. На этой платформе можно найти курс, без преувеличений, на любую тему – начиная от тьюториала по какой-то камере и заканчивая теоретическим курсом по управлению финансовыми рисками. Язык и формат обучения устанавливается преподавателем, поэтому стоит внимательно изучить информацию о курсе перед покупкой.
Рейтинг
4.2
(5)
(7)
(2)
(0)
(1)
Комментарии (15)
Как и любой другой веб-сайт, konevy использует файлы cookie. Эти файлы используются для хранения информации, включая предпочтения посетителей и страницы веб-сайта, которые он/она посещал. Информация используется для того, чтобы подстроить содержимое нашей страницы под тип браузера пользователя и другие параметры и таким образом улучшить его пользовательский опыт. Для получения более подробной информации о файлах cookie, пожалуйста, прочтите статью «Что такое файлы cookie»