DevOps Security Considerations: DevSecOps Principles


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Explore core concepts, benefits, and different phases of DevSecOps in this 11-video course, which compares DevOps with DevSecOps. In this course, learners will explore the prominent DevSecOps tools that are used to integrate security throughout the DevOps pipeline and illustrate the DevSecOps maturity model. Watch demonstrations of how to integrate security and testing into DevSecOps environment. Learn how to secure Jenkins secrets to store and manage credentials; to use Jenkins OAuth plugin to securely pull from GitHub (a Git repository hosting company); and to use pen test tool to conduct penetration testing on deployed applications. Explore the prominent categories of tools provided by OWASP (Open Web Application Security Project) to secure applications. OWASP comes with Top 10 Issue Ruleset, and provides proper guidelines to ensure that those issues are taken care of when applications are written. Other key topics include Jenkins credentials, Static Application Security Testing (SAST), and Dynamic Application Security Testing (DAST).



Expected Duration (hours)
0.9

Lesson Objectives

DevOps Security Considerations: DevSecOps Principles

  • discover the key concepts covered in this course
  • compare DevOps and DevSecOps and describe the benefits of adopting the DevSecOps paradigm
  • list the essential phases of the DevSecOps workflow and describe the critical checklists that can help secure DevOps implementations
  • describe DevSecOps tools that are used by development teams to integrate security throughout the DevOps pipeline
  • describe the DevSecOps Maturity Model and the dimensions that can help automate security checks
  • describe how security and testing can be integrated into a DevSecOps environment without compromising speed, security, or quality
  • use the Jenkins OAuth plugin to securely pull from GitHub
  • recall best practices for securing Jenkins Secrets to store and manage credentials
  • list the categories of tools provided by OWASP to secure applications
  • use penetration testing tools to conduct penetration testing on deployed application to identify vulnerabilities
  • summarize the key concepts covered in this course
  • Course Number:
    it_dosecdj_02_enus

    Expertise Level
    Intermediate