Общая информация
Название DevSecOps Bootcamp
Тип
Размер 7.01Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
01 - Security Essentials.pdf 9.79Мб
02 - Intro to DevSecOps.pdf 9.05Мб
03 - App Vulnerability Scanning.pdf 6.82Мб
04 - Vulnerability Management.pdf 4.88Мб
05 - Vulnerability Scanning for App Dependencies.pdf 4.23Мб
06 - Set up CD Pipeline.pdf 5.66Мб
07 - Image Scanning.pdf 7.23Мб
08 - AWS Cloud Security and Access Management.pdf 4.68Мб
09 - Secure Continuous Deployment & DAST.pdf 7.19Мб
10 - IaC and GitOps for DevSecOps.pdf 7.18Мб
11 - Logging & Monitoring for Security.pdf 7.54Мб
12.1-Kubernetes-Security-Overview.mp4 24.29Мб
12.2-Kubernetes-Security-Best-Practices.mp4 93.25Мб
12.3-Provision-AWS-EKS-Cluster.mp4 83.70Мб
12 - Introduction to Kubernetes Security.pdf 4.03Мб
13.1-Chapter-Introduction.mp4 8.13Мб
13.2-Role-Based-Access-Control-_RBAC_.mp4 59.99Мб
13.3-IAM-Roles-and-K8s-Roles-How-it-works.mp4 37.65Мб
13.4-Configure-IAM-Roles-and-link-to-K8s-Roles-in-IaC.mp4 60.21Мб
13.5-Configure-K8s-Role-and-ClusterRole-in-IaC.mp4 100.39Мб
13.6-Review-and-Test-Access.mp4 89.53Мб
13.7-Summary-_-Wrap-Up.mp4 14.76Мб
13 - Kubernetes Access Management.pdf 8.85Мб
14.1-Using-GitLab-OIDC-in-AWS.mp4 38.10Мб
14.2-Configure-Authentication-with-GitLab-Identity-Provider.mp4 43.15Мб
14.3-Pipeline-Configuration-for-establishing-a-secure-connection.mp4 81.66Мб
14.4-Terraform-Configuration-for-EKS-provisioning.mp4 105.72Мб
14.5-Summary-_-Wrap-Up.mp4 19.45Мб
14 - Secure IaC Pipeline for EKS Provisioning.pdf 7.63Мб
15.1-Introduction-to-EKS-Blueprints.mp4 15.83Мб
15.2-Overview-of-EKS-Add-ons-we-install.mp4 36.14Мб
15.3-Configure-EKS-Add-ons.mp4 70.40Мб
15.4-Troubleshooting-_-Tuning-Autoscaler.mp4 68.48Мб
15.5-Access-Token-Expiration.mp4 6.13Мб
15 - EKS Blueprints.pdf 9.86Мб
16.10-Create-CI-Pipeline-that-triggers-GitOps-Pipeline.mp4 29.62Мб
16.11-See-Whole-Automated-Workflow-in-Action.mp4 31.85Мб
16.1-Chapter-Overview.mp4 8.79Мб
16.2-ArgoCD-explained-_Part-1_-What_-Why-and-How.mp4 29.92Мб
16.3-ArgoCD-explained-_Part-2_-Benefits-and-Configuration.mp4 66.55Мб
16.4-Overview-of-CI-or-CD-Pipelines-to-Git-repositories.mp4 27.34Мб
16.5-Configure-ArgoCD-in-IaC-_Deploy-Argo-Part-1_.mp4 81.32Мб
16.6-IaC-Pipeline-Configuration-_Deploy-Argo-Part-2_.mp4 44.50Мб
16 7-Deployment-through-Pipeline-and-Access-Argo-UI- Deploy-Argo-Part-3 mp4 51.84Мб
16.8-K8s-Manifests-for-Microservices-App-using-Kustomize.mp4 75.07Мб
16.9-Create-GitOps-Pipeline-to-update-Kustomization-File.mp4 76.97Мб
16 - App Release Pipeline with ArgoCD.pdf 11.03Мб
17.1-Why-Policy-as-Code.mp4 12.27Мб
17.2-Introduction-to-Open-Policy-Agent-_OPA_-and-OPA-Gatekeeper.mp4 29.85Мб
17.3-How-Gatekeeper-and-OPA-works.mp4 26.17Мб
17.4-Install-OPA-Gatekeeper-in-Cluster.mp4 29.90Мб
17.5-Defining-Policies.mp4 31.14Мб
17.6-Define-Policy-to-reject-NodePort-Service.mp4 108.40Мб
17.7-Define-Policy-to-reject-Privileged-Containers.mp4 62.91Мб
17.8-Summary.mp4 7.71Мб
17 - Policy as Code.pdf 6.61Мб
18.1-Why-Secrets-Manager-are-needed.mp4 30.32Мб
18.2-Introduction-to-External-Secrets-Operator-in-K8s.mp4 10.56Мб
18.3-Capabilities-of-Secrets-Management-Tools.mp4 9.72Мб
18.4-Vault-Capabilities-_Vault-Deep-Dive-Part-1_.mp4 20.50Мб
18.5-How-Vault-works-_Vault-Deep-Dive-Part-2_.mp4 34.63Мб
18.6-Introduction-to-AWS-Secrets-Manager.mp4 13.14Мб
18.7-Deploy-External-Secrets-Controller-_Demo-Part-1_.mp4 45.45Мб
18.8-Create-SecretStore-and-ExternalSecret.mp4 61.43Мб
18.9-Use-Secret-in-Microservice-_Demo-Part-3_.mp4 17.38Мб
18 - Secrets Management.pdf 9.43Мб
19.10-Wrap-Up.mp4 5.09Мб
19.1-Chapter-and-Demo-Overview.mp4 5.69Мб
19.2-Service-Mesh-and-Istio-What_-Why-and-How.mp4 52.27Мб
19.3-Install-Istio-in-K8s-cluster.mp4 91.55Мб
19.4-Configure-Traffic-Routing.mp4 86.77Мб
19.5-Configure-a-Secure-Gateway.mp4 57.80Мб
19.6-mTLS-Deep-Dive.mp4 76.24Мб
19.7-Authorization-in-Istio-Deep-Dive.mp4 47.19Мб
19.8-Istio-Policies-vs-K8s-Network-Policies.mp4 17.54Мб
19.9-Configure-Authorization-Policies.mp4 75.86Мб
19 - Service Mesh with Istio.pdf 7.90Мб
1 - AWS Security Essentials (8 - AWS Cloud Security & Access Management).mp4 26.97Мб
1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning).mp4 69.62Мб
1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation).mp4 31.78Мб
1 - Introduction to Security (1 - Security Essentials).mp4 5.32Мб
1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps).mp4 38.28Мб
1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp4 8.10Мб
1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images).mp4 5.41Мб
1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deployment & DAST).mp4 27.93Мб
1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies).mp4 53.42Мб
1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp4 25.61Мб
1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp4 14.78Мб
1 - Why learn DevSecOps.mp4 9.27Мб
20.1-What-is-Compliance.mp4 13.33Мб
20.2-What-are-CIS-Benchmarks.mp4 41.62Мб
20.3-Why-Compliance-as-Code.mp4 8.13Мб
20.4-Demo-Overview-and-Introduction-to-AWS-Config.mp4 44.58Мб
20.5-Setting-up-AWS-Config-Rules.mp4 49.43Мб
20 6-Configure-Auto-Remediation-for-Insecure-Security-Groups-for-EC2-Instances mp4 63.94Мб
20.7-Configure-Auto-Remediation-for-CloudTrail-Logging_-if-switched-off.mp4 27.46Мб
20.8-Configure-Compliance-Rules-for-AWS-EKS-Service.mp4 41.75Мб
20.9-Wrap-Up.mp4 5.93Мб
20 - Compliance as Code.pdf 6.69Мб
21.1-Why-DevSecOps-is-Important.mp4 96.08Мб
21.2-Driving-Cultural-Change-Real-World-Examples-of-Companies.mp4 232.31Мб
21 3-How-to-start-implementing-DevSecOps-in-Organizations- Practical-Tips mp4 402.59Мб
21.4-Final-Summary.-The-DevSecOps-Transformation.mp4 228.03Мб
22 -Apply-for-the-Certified-DevSecOps-Practitioner-credential- Digital-Badge mp4 57.60Мб
2 - Configure Automated Security Scanning in Application Image.mp4 64.14Мб
2 - Configure AWS Systems Manager for EC2 Server.mp4 41.49Мб
2 - Impact of Missing Security Insights.mp4 10.02Мб
2 - Importance of Security & Impact of Security Breaches.mp4 48.12Мб
2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4 42.59Мб
2 - Introduction to CloudTrail and CloudWatch.mp4 14.98Мб
2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4 100.92Мб
2 - Introduction to Security Layers for AWS Access.mp4 30.22Мб
2 - Pre-Requisites of Bootcamp.mp4 11.25Мб
2 - Terraform Script for AWS Infrastructure Provisioning.mp4 61.21Мб
2 - Understand AWS Access Management using IAM Service.mp4 7.24Мб
2 - Understand DevSecOps.mp4 45.26Мб
3 - Analyze & Fix Security Issues from Findings in Application Image.mp4 79.65Мб
3 - Automate Uploading Security Scan Results to DefectDojo.mp4 102.12Мб
3 - AWS SSM Commands in Release Pipeline for Server Access.mp4 46.16Мб
3 - CloudTrail Event History.mp4 32.32Мб
3 - DevSecOps Bootcamp Curriculum Overview.mp4 83.18Мб
3 - How to Secure Systems Against Attacks.mp4 12.77Мб
3 - Integrate CICD Pipeline with AWS ECR.mp4 70.02Мб
3 - Overview of Static Security Scans in CI Pipeline.mp4 4.09Мб
3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4 25.00Мб
3 - Roles & Responsibilities in DevSecOps.mp4 30.48Мб
3 - Secret Scanning with GitLeaks - Local Environment.mp4 49.76Мб
3 - Securing AWS Root User Account.mp4 23.79Мб
4 - Automate Uploading Image Scanning Results in DefectDojo.mp4 33.12Мб
4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4 37.31Мб
4 - Configure Application Deployment Environment on EC2 Server.mp4 35.76Мб
4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4 94.67Мб
4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4 63.12Мб
4 - IAM Users, Groups & Policies.mp4 27.03Мб
4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4 64.10Мб
4 - Secure Continuous Deployment to Server using SSM.mp4 65.44Мб
4 - Support and Other Bootcamp Materials.mp4 7.52Мб
4 - Types of Security Attacks - Part 1.mp4 74.16Мб
5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4 6.25Мб
5 - Configure Remote State for Terraform.mp4 27.14Мб
5 - Create CloudWatch Alarm for EC2 Instance.mp4 62.64Мб
5 - Deploy Application to EC2 Server with Release Pipeline.mp4 56.30Мб
5 - Docker Security Best Practices.mp4 38.50Мб
5 - False Positives & Fixing Security Vulnerabilities.mp4 61.74Мб
5 - Secure Access from CICD Pipeline to AWS.mp4 46.81Мб
5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp4 57.85Мб
5 - Types of Security Attacks - Part 2.mp4 73.24Мб
6 - Add Automated Security Scan to TF Infrastructure Code.mp4 35.59Мб
6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4 44.00Мб
6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4 56.14Мб
6 - Create Custom Metric Filter for Failed Login Metrics.mp4 41.44Мб
6 - Integrate SAST Scans in Release Pipeline.mp4 79.46Мб
6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4 10.37Мб
6 - OWASP top 10 - Part 1.mp4 105.52Мб
6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4 18.16Мб
7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4 82.74Мб
7 - Configure Alarm for Failed Login Attempts.mp4 36.11Мб
7 - Overview of Automated Application Code and Image Scanning Steps.mp4 2.97Мб
7 - Overview of IAM Resources & Secure Access Management in AWS.mp4 9.18Мб
7 - OWASP top 10 - Part 2.mp4 79.77Мб
7 - Understand Dynamic Application Security Testing (DAST).mp4 31.16Мб
7 - Understand IaC Concept Cattle vs Pets.mp4 10.80Мб
8 - Configure Automated DAST Scans in CICD Pipeline.mp4 72.80Мб
8 - Configure AWS Budgets for Monthly Usage Costs.mp4 22.54Мб
8 - Security in Layers.mp4 35.80Мб
9 - Complete Bootcamp Part 1 - Next Steps.mp4 4.55Мб
9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4 7.40Мб
DevSpecOps Bootcamp.txt 4.44Кб
links.txt 3.79Кб
Статистика распространения по странам
Россия (RU) 15
Украина (UA) 4
Беларусь (BY) 1
Латвия (LV) 1
Израиль (IL) 1
Вьетнам (VN) 1
Азербайджан (AZ) 1
США (US) 1
Тайланд (TH) 1
Австралия (AU) 1
Всего 27
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент