DevOps: Configuration Management, CI/CD, Monitoring-Security

Protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework

Ratings: 4.37 / 5.00




Description

If continuous security in development lifecycle like configuration checks, code analysis, vulnerability scanning etc. is not adequately automated then it leads to increased security violations and hacking/phishing attacks. DevOps enables rapid application development and follows a traditional way of performing security checks. It helps an organization deploy software while maintaining service stability. If you’re looking to protect your organization with the collaboration of DevOps and security then is the perfect Course for you!

This comprehensive 2-in-1 course takes a step-by-step practical approach to protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework. You’ll initially implement a complete DevOps cycle with use cases as well as implement DevOps using a Docker container. You’ll explore continuous integration tools and different configuration management tools using Chef, puppet, and Ansible. Moving further, you’ll create automatic compliance by using the DevOps Audit Defense Toolkit. Finally, you’ll build a continuous feedback loop by automating all security checks throughout the Continuous Delivery pipeline.

Towards the end of this course, you'll protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework.

Contents and Overview

This training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible.

The first course, Professional DevOps, covers DevOps tools and technology frameworks to implement DevOps for your organization. This course helps you implement a complete DevOps cycle in your existing IT environment. Each section of this course will help you implement the DevOps culture in your professional environment. With the help of source control, continuous build, continuous integration, automated test with quality controls, and container technologies, this course will be your perfect guide to learn and apply DevOps in your organization. By the end of this course, you’ll be able to identify and choose the appropriate tools and technology framework to implement DevOps in your organization.

The second course, Practical DevOps Security, covers protecting your organization with the collaboration of DevOps and security. This course shows you how to apply DevOps security best practices at every stage in your DevOps pipeline. You will learn proven approaches to reducing vulnerability and strengthening your defenses against attack. You will understand using security as code with the intent of making security and compliance consumable as a service. This course explains how DevOps security practices differ from traditional security approaches and provide techniques to embed governance and cybersecurity functions throughout the DevOps workflow. By the end of the course, you will have learned best practices in DevSecOps, the core concepts of secure DevOps, and how security can be integrated into the development pipeline.

Towards the end of this course, you'll protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework.

About the Authors

Umar Murtaza has more than 25 years’ experience of System Administration in implementing, commissioning development, testing, and production environments. He has designed and implemented a number of DevOps environments, conducted 4- day hands-on DevOps training sessions at a number of private and government telecommunications and software companies/institutions.

Gurpreet Sachdeva is a Technology Executive with 21+ years' experience working on some of the most challenging technologies related to Cloud Computing, DevOps, and Security. Gurpreet did his B. Tech (C.S.) from NIT, Kurukshetra, and M.S. (Software Systems) from BITS, Pilani. He is currently working as Assistant Vice President—Technology with Aricent, Gurgaon. He is a keen Java enthusiast and co-founder of Delhi – NCR – Java User Group. Gurpreet is an invited speaker in prestigious conferences such as Oracle – Java One, Great India Developer Summit.

What You Will Learn!

  • Implement DevOps using a Docker container
  • Explore continuous integration tools and different configuration management tools.
  • Explore Container orchestration with best practices and implement security solutions in the DevOps cycle.
  • Integrate Security into Continuous Delivery workflows for continuous security.
  • Leverage Infrastructure as Code techniques for secure configuration management and provisioning.
  • Eliminate manual security practices such as risk assessments and audits by automating all the verification.
  • Build a better defense mechanism by the use of Red and Blue teams.
  • Create automatic compliance by using the DevOps Audit Defense Toolkit.
  • Build continuous a feedback loop by automating all security checks throughout the Continuous Delivery pipeline.

Who Should Attend!

  • System Administrators, Solution Architects, DevOps Engineers, Security Consultant, Cloud Security Strategists who want to understand the concept of building a DevOps strategy from scratch and are looking to use the principles of DevOps to secure their software in a continuous and iterative manner!