TorBT - Torrents and Magnet Links Search Engine
techworld-with-nana - devsecops-bootcamp-video
- Date: 2025-01-23
- Size: 7.1 GB
- Files: 169
File Name
Size
part 2/21.3-How-to-start-implementing-DevSecOps-in-Organizations-_Practical-Tips_.mp4
403 MB
part 1/01 - Security Essentials.pdf
9.8 MB
part 1/02 - Intro to DevSecOps.pdf
9.0 MB
part 1/03 - App Vulnerability Scanning.pdf
6.8 MB
part 1/04 - Vulnerability Management.pdf
4.9 MB
part 1/05 - Vulnerability Scanning for App Dependencies.pdf
4.2 MB
part 1/06 - Set up CD Pipeline.pdf
5.7 MB
part 1/07 - Image Scanning.pdf
7.2 MB
part 1/08 - AWS Cloud Security and Access Management.pdf
4.7 MB
part 1/09 - Secure Continuous Deployment & DAST.pdf
7.2 MB
part 1/10 - IaC and GitOps for DevSecOps.pdf
7.2 MB
part 1/11 - Logging & Monitoring for Security.pdf
7.5 MB
part 1/links.txt
3.8 kB
part 1/0 - Getting Started with the DevSecOps Bootcamp/1 - Why learn DevSecOps.mp4
9.3 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/2 - Pre-Requisites of Bootcamp.mp4
11 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/3 - DevSecOps Bootcamp Curriculum Overview.mp4
83 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/4 - Support and Other Bootcamp Materials.mp4
7.5 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4
6.3 MB
part 1/1 - Security Essentials/1 - Introduction to Security (1 - Security Essentials).mp4
5.3 MB
part 1/1 - Security Essentials/2 - Importance of Security & Impact of Security Breaches.mp4
48 MB
part 1/1 - Security Essentials/3 - How to Secure Systems Against Attacks.mp4
13 MB
part 1/1 - Security Essentials/4 - Types of Security Attacks - Part 1.mp4
74 MB
part 1/1 - Security Essentials/5 - Types of Security Attacks - Part 2.mp4
73 MB
part 1/1 - Security Essentials/6 - OWASP top 10 - Part 1.mp4
106 MB
part 1/1 - Security Essentials/7 - OWASP top 10 - Part 2.mp4
80 MB
part 1/1 - Security Essentials/8 - Security in Layers.mp4
36 MB
part 1/2 - Introduction to DevSecOps/1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps).mp4
38 MB
part 1/2 - Introduction to DevSecOps/2 - Understand DevSecOps.mp4
45 MB
part 1/2 - Introduction to DevSecOps/3 - Roles & Responsibilities in DevSecOps.mp4
30 MB
part 1/3 - Application Vulnerability Scanning/1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning).mp4
70 MB
part 1/3 - Application Vulnerability Scanning/2 - Impact of Missing Security Insights.mp4
10 MB
part 1/3 - Application Vulnerability Scanning/3 - Secret Scanning with GitLeaks - Local Environment.mp4
50 MB
part 1/3 - Application Vulnerability Scanning/4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4
64 MB
part 1/3 - Application Vulnerability Scanning/5 - False Positives & Fixing Security Vulnerabilities.mp4
62 MB
part 1/3 - Application Vulnerability Scanning/6 - Integrate SAST Scans in Release Pipeline.mp4
80 MB
part 1/4 - Vulnerability Management and Remediation/1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation).mp4
32 MB
part 1/4 - Vulnerability Management and Remediation/2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4
101 MB
part 1/4 - Vulnerability Management and Remediation/3 - Automate Uploading Security Scan Results to DefectDojo.mp4
102 MB
part 1/4 - Vulnerability Management and Remediation/4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4
63 MB
part 1/5 - Vulnerability Scanning for Application Dependencies/1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies).mp4
53 MB
part 1/5 - Vulnerability Scanning for Application Dependencies/2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4
43 MB
part 1/5 - Vulnerability Scanning for Application Dependencies/3 - Overview of Static Security Scans in CI Pipeline.mp4
4.1 MB
part 1/6 - Build a CD Pipeline/1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp4
8.1 MB
part 1/6 - Build a CD Pipeline/2 - Introduction to Security Layers for AWS Access.mp4
30 MB
part 1/6 - Build a CD Pipeline/3 - Integrate CICD Pipeline with AWS ECR.mp4
70 MB
part 1/6 - Build a CD Pipeline/4 - Configure Application Deployment Environment on EC2 Server.mp4
36 MB
part 1/6 - Build a CD Pipeline/5 - Deploy Application to EC2 Server with Release Pipeline.mp4
56 MB
part 1/6 - Build a CD Pipeline/6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4
56 MB
part 1/6 - Build a CD Pipeline/7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4
83 MB
part 1/7 - Image Scanning - Build Secure Docker Images/1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images).mp4
5.4 MB
part 1/7 - Image Scanning - Build Secure Docker Images/2 - Configure Automated Security Scanning in Application Image.mp4
64 MB
part 1/7 - Image Scanning - Build Secure Docker Images/3 - Analyze & Fix Security Issues from Findings in Application Image.mp4
80 MB
part 1/7 - Image Scanning - Build Secure Docker Images/4 - Automate Uploading Image Scanning Results in DefectDojo.mp4
33 MB
part 1/7 - Image Scanning - Build Secure Docker Images/5 - Docker Security Best Practices.mp4
38 MB
part 1/7 - Image Scanning - Build Secure Docker Images/6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4
44 MB
part 1/7 - Image Scanning - Build Secure Docker Images/7 - Overview of Automated Application Code and Image Scanning Steps.mp4
3.0 MB
part 1/8 - AWS Cloud Security & Access Management/1 - AWS Security Essentials (8 - AWS Cloud Security & Access Management).mp4
27 MB
part 1/8 - AWS Cloud Security & Access Management/2 - Understand AWS Access Management using IAM Service.mp4
7.2 MB
part 1/8 - AWS Cloud Security & Access Management/3 - Securing AWS Root User Account.mp4
24 MB
part 1/8 - AWS Cloud Security & Access Management/4 - IAM Users, Groups & Policies.mp4
27 MB
part 1/8 - AWS Cloud Security & Access Management/5 - Secure Access from CICD Pipeline to AWS.mp4
47 MB
part 1/8 - AWS Cloud Security & Access Management/6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4
18 MB
part 1/8 - AWS Cloud Security & Access Management/7 - Overview of IAM Resources & Secure Access Management in AWS.mp4
9.2 MB
part 1/9 - Secure Continuous Deployment & DAST/1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deployment & DAST).mp4
28 MB
part 1/9 - Secure Continuous Deployment & DAST/2 - Configure AWS Systems Manager for EC2 Server.mp4
42 MB
part 1/9 - Secure Continuous Deployment & DAST/3 - AWS SSM Commands in Release Pipeline for Server Access.mp4
46 MB
part 1/9 - Secure Continuous Deployment & DAST/4 - Secure Continuous Deployment to Server using SSM.mp4
65 MB
part 1/9 - Secure Continuous Deployment & DAST/5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp4
58 MB
part 1/9 - Secure Continuous Deployment & DAST/6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4
10 MB
part 1/9 - Secure Continuous Deployment & DAST/7 - Understand Dynamic Application Security Testing (DAST).mp4
31 MB
part 1/9 - Secure Continuous Deployment & DAST/8 - Configure Automated DAST Scans in CICD Pipeline.mp4
73 MB
part 1/9 - Secure Continuous Deployment & DAST/9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4
7.4 MB
part 1/10 - IaC and GitOps for DevSecOps/1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp4
26 MB
part 1/10 - IaC and GitOps for DevSecOps/2 - Terraform Script for AWS Infrastructure Provisioning.mp4
61 MB
part 1/10 - IaC and GitOps for DevSecOps/3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4
25 MB
part 1/10 - IaC and GitOps for DevSecOps/4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4
37 MB
part 1/10 - IaC and GitOps for DevSecOps/5 - Configure Remote State for Terraform.mp4
27 MB
part 1/10 - IaC and GitOps for DevSecOps/6 - Add Automated Security Scan to TF Infrastructure Code.mp4
36 MB
part 1/10 - IaC and GitOps for DevSecOps/7 - Understand IaC Concept Cattle vs Pets.mp4
11 MB
part 1/11 - Logging & Monitoring for Security/1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp4
15 MB
part 1/11 - Logging & Monitoring for Security/2 - Introduction to CloudTrail and CloudWatch.mp4
15 MB
part 1/11 - Logging & Monitoring for Security/3 - CloudTrail Event History.mp4
32 MB
part 1/11 - Logging & Monitoring for Security/4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4
95 MB
part 1/11 - Logging & Monitoring for Security/5 - Create CloudWatch Alarm for EC2 Instance.mp4
63 MB
part 1/11 - Logging & Monitoring for Security/6 - Create Custom Metric Filter for Failed Login Metrics.mp4
41 MB
part 1/11 - Logging & Monitoring for Security/7 - Configure Alarm for Failed Login Attempts.mp4
36 MB
part 1/11 - Logging & Monitoring for Security/8 - Configure AWS Budgets for Monthly Usage Costs.mp4
22 MB
part 1/11 - Logging & Monitoring for Security/9 - Complete Bootcamp Part 1 - Next Steps.mp4
4.6 MB
part 2/12 - Introduction to Kubernetes Security.pdf
4.0 MB
part 2/12.1-Kubernetes-Security-Overview.mp4
24 MB
part 2/12.2-Kubernetes-Security-Best-Practices.mp4
93 MB
part 2/12.3-Provision-AWS-EKS-Cluster.mp4
84 MB
part 2/13 - Kubernetes Access Management.pdf
8.8 MB
part 2/13.1-Chapter-Introduction.mp4
8.1 MB
part 2/13.2-Role-Based-Access-Control-_RBAC_.mp4
60 MB
part 2/13.3-IAM-Roles-and-K8s-Roles-How-it-works.mp4
38 MB
part 2/13.4-Configure-IAM-Roles-and-link-to-K8s-Roles-in-IaC.mp4
60 MB
part 2/13.5-Configure-K8s-Role-and-ClusterRole-in-IaC.mp4
100 MB
part 2/13.6-Review-and-Test-Access.mp4
90 MB
part 2/13.7-Summary-_-Wrap-Up.mp4
15 MB
part 2/14 - Secure IaC Pipeline for EKS Provisioning.pdf
7.6 MB
part 2/14.1-Using-GitLab-OIDC-in-AWS.mp4
38 MB
part 2/14.2-Configure-Authentication-with-GitLab-Identity-Provider.mp4
43 MB
part 2/14.3-Pipeline-Configuration-for-establishing-a-secure-connection.mp4
82 MB
part 2/14.4-Terraform-Configuration-for-EKS-provisioning.mp4
106 MB
part 2/14.5-Summary-_-Wrap-Up.mp4
20 MB
part 2/15 - EKS Blueprints.pdf
9.9 MB
part 2/15.1-Introduction-to-EKS-Blueprints.mp4
16 MB
part 2/15.2-Overview-of-EKS-Add-ons-we-install.mp4
36 MB
part 2/15.3-Configure-EKS-Add-ons.mp4
70 MB
part 2/15.4-Troubleshooting-_-Tuning-Autoscaler.mp4
68 MB
part 2/15.5-Access-Token-Expiration.mp4
6.1 MB
part 2/16 - App Release Pipeline with ArgoCD.pdf
11 MB
part 2/16.1-Chapter-Overview.mp4
8.8 MB
part 2/16.2-ArgoCD-explained-_Part-1_-What_-Why-and-How.mp4
30 MB
part 2/16.3-ArgoCD-explained-_Part-2_-Benefits-and-Configuration.mp4
67 MB
part 2/16.4-Overview-of-CI-or-CD-Pipelines-to-Git-repositories.mp4
27 MB
part 2/16.5-Configure-ArgoCD-in-IaC-_Deploy-Argo-Part-1_.mp4
81 MB
part 2/16.6-IaC-Pipeline-Configuration-_Deploy-Argo-Part-2_.mp4
44 MB
part 2/16.7-Deployment-through-Pipeline-and-Access-Argo-UI-_Deploy-Argo-Part-3_.mp4
52 MB
part 2/16.8-K8s-Manifests-for-Microservices-App-using-Kustomize.mp4
75 MB
part 2/16.9-Create-GitOps-Pipeline-to-update-Kustomization-File.mp4
77 MB
part 2/16.10-Create-CI-Pipeline-that-triggers-GitOps-Pipeline.mp4
30 MB
part 2/16.11-See-Whole-Automated-Workflow-in-Action.mp4
32 MB
part 2/17 - Policy as Code.pdf
6.6 MB
part 2/17.1-Why-Policy-as-Code.mp4
12 MB
part 2/17.2-Introduction-to-Open-Policy-Agent-_OPA_-and-OPA-Gatekeeper.mp4
30 MB
part 2/17.3-How-Gatekeeper-and-OPA-works.mp4
26 MB
part 2/17.4-Install-OPA-Gatekeeper-in-Cluster.mp4
30 MB
part 2/17.5-Defining-Policies.mp4
31 MB
part 2/17.6-Define-Policy-to-reject-NodePort-Service.mp4
108 MB
part 2/17.7-Define-Policy-to-reject-Privileged-Containers.mp4
63 MB
part 2/17.8-Summary.mp4
7.7 MB
part 2/18 - Secrets Management.pdf
9.4 MB
part 2/18.1-Why-Secrets-Manager-are-needed.mp4
30 MB
part 2/18.2-Introduction-to-External-Secrets-Operator-in-K8s.mp4
11 MB
part 2/18.3-Capabilities-of-Secrets-Management-Tools.mp4
9.7 MB
part 2/18.4-Vault-Capabilities-_Vault-Deep-Dive-Part-1_.mp4
20 MB
part 2/18.5-How-Vault-works-_Vault-Deep-Dive-Part-2_.mp4
35 MB
part 2/18.6-Introduction-to-AWS-Secrets-Manager.mp4
13 MB
part 2/18.7-Deploy-External-Secrets-Controller-_Demo-Part-1_.mp4
46 MB
part 2/18.8-Create-SecretStore-and-ExternalSecret.mp4
61 MB
part 2/18.9-Use-Secret-in-Microservice-_Demo-Part-3_.mp4
17 MB
part 2/19 - Service Mesh with Istio.pdf
7.9 MB
part 2/19.1-Chapter-and-Demo-Overview.mp4
5.7 MB
part 2/19.2-Service-Mesh-and-Istio-What_-Why-and-How.mp4
52 MB
part 2/19.3-Install-Istio-in-K8s-cluster.mp4
92 MB
part 2/19.4-Configure-Traffic-Routing.mp4
87 MB
part 2/19.5-Configure-a-Secure-Gateway.mp4
58 MB
part 2/19.6-mTLS-Deep-Dive.mp4
76 MB
part 2/19.7-Authorization-in-Istio-Deep-Dive.mp4
47 MB
part 2/19.8-Istio-Policies-vs-K8s-Network-Policies.mp4
18 MB
part 2/19.9-Configure-Authorization-Policies.mp4
76 MB
part 2/19.10-Wrap-Up.mp4
5.1 MB
part 2/20 - Compliance as Code.pdf
6.7 MB
part 2/20.1-What-is-Compliance.mp4
13 MB
part 2/20.2-What-are-CIS-Benchmarks.mp4
42 MB
part 2/20.3-Why-Compliance-as-Code.mp4
8.1 MB
part 2/20.4-Demo-Overview-and-Introduction-to-AWS-Config.mp4
45 MB
part 2/20.5-Setting-up-AWS-Config-Rules.mp4
49 MB
part 2/20.6-Configure-Auto-Remediation-for-Insecure-Security-Groups-for-EC2-Instances.mp4
64 MB
part 2/20.7-Configure-Auto-Remediation-for-CloudTrail-Logging_-if-switched-off.mp4
28 MB
part 2/20.8-Configure-Compliance-Rules-for-AWS-EKS-Service.mp4
42 MB
part 2/20.9-Wrap-Up.mp4
5.9 MB
part 2/21.1-Why-DevSecOps-is-Important.mp4
96 MB
part 2/21.2-Driving-Cultural-Change-Real-World-Examples-of-Companies.mp4
232 MB
code.zip
134 MB
part 2/21.4-Final-Summary.-The-DevSecOps-Transformation.mp4
228 MB
part 2/22.-Apply-for-the-Certified-DevSecOps-Practitioner-credential-_Digital-Badge_.mp4
58 MB