~Get Your Files Here !/0 - Getting Started with the DevSecOps Bootcamp/1 - Why learn DevSecOps.mp49.27MB
~Get Your Files Here !/0 - Getting Started with the DevSecOps Bootcamp/2 - Pre-Requisites of Bootcamp.mp411.25MB
~Get Your Files Here !/0 - Getting Started with the DevSecOps Bootcamp/3 - DevSecOps Bootcamp Curriculum Overview.mp483.18MB
~Get Your Files Here !/0 - Getting Started with the DevSecOps Bootcamp/4 - Support and Other Bootcamp Materials.mp47.52MB
~Get Your Files Here !/0 - Getting Started with the DevSecOps Bootcamp/5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp46.25MB
~Get Your Files Here !/1 - Security Essentials/1 - Introduction to Security (1 - Security Essentials).mp45.32MB
~Get Your Files Here !/1 - Security Essentials/2 - Importance of Security & Impact of Security Breaches.mp448.12MB
~Get Your Files Here !/1 - Security Essentials/3 - How to Secure Systems Against Attacks.mp412.77MB
~Get Your Files Here !/1 - Security Essentials/4 - Types of Security Attacks - Part 1.mp474.16MB
~Get Your Files Here !/1 - Security Essentials/5 - Types of Security Attacks - Part 2.mp473.24MB
~Get Your Files Here !/1 - Security Essentials/6 - OWASP top 10 - Part 1.mp4105.52MB
~Get Your Files Here !/1 - Security Essentials/7 - OWASP top 10 - Part 2.mp479.77MB
~Get Your Files Here !/1 - Security Essentials/8 - Security in Layers.mp435.8MB
~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp425.61MB
~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/2 - Terraform Script for AWS Infrastructure Provisioning.mp461.21MB
~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp425MB
~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp437.31MB
~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/5 - Configure Remote State for Terraform.mp427.14MB
~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/6 - Add Automated Security Scan to TF Infrastructure Code.mp435.59MB
~Get Your Files Here !/10 - IaC and GitOps for DevSecOps/7 - Understand IaC Concept Cattle vs Pets.mp410.8MB
~Get Your Files Here !/11 - Logging & Monitoring for Security/1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp414.78MB
~Get Your Files Here !/11 - Logging & Monitoring for Security/2 - Introduction to CloudTrail and CloudWatch.mp414.98MB
~Get Your Files Here !/11 - Logging & Monitoring for Security/3 - CloudTrail Event History.mp432.32MB
~Get Your Files Here !/11 - Logging & Monitoring for Security/4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp494.67MB
~Get Your Files Here !/11 - Logging & Monitoring for Security/5 - Create CloudWatch Alarm for EC2 Instance.mp462.64MB
~Get Your Files Here !/11 - Logging & Monitoring for Security/6 - Create Custom Metric Filter for Failed Login Metrics.mp441.44MB
~Get Your Files Here !/11 - Logging & Monitoring for Security/7 - Configure Alarm for Failed Login Attempts.mp436.11MB
~Get Your Files Here !/11 - Logging & Monitoring for Security/8 - Configure AWS Budgets for Monthly Usage Costs.mp422.54MB
~Get Your Files Here !/11 - Logging & Monitoring for Security/9 - Complete Bootcamp Part 1 - Next Steps.mp44.55MB
~Get Your Files Here !/2 - Introduction to DevSecOps/1 - Issues with Traditional Approach to Security (2 - Introduction to DevSecOps).mp438.28MB
~Get Your Files Here !/2 - Introduction to DevSecOps/2 - Understand DevSecOps.mp445.26MB
~Get Your Files Here !/2 - Introduction to DevSecOps/3 - Roles & Responsibilities in DevSecOps.mp430.48MB
~Get Your Files Here !/3 - Application Vulnerability Scanning/1 - Build a Continuous Integration Pipeline (3 - Application Vulnerability Scanning).mp469.62MB
~Get Your Files Here !/3 - Application Vulnerability Scanning/2 - Impact of Missing Security Insights.mp410.02MB
~Get Your Files Here !/3 - Application Vulnerability Scanning/3 - Secret Scanning with GitLeaks - Local Environment.mp449.76MB
~Get Your Files Here !/3 - Application Vulnerability Scanning/4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp464.1MB
~Get Your Files Here !/3 - Application Vulnerability Scanning/5 - False Positives & Fixing Security Vulnerabilities.mp461.74MB
~Get Your Files Here !/3 - Application Vulnerability Scanning/6 - Integrate SAST Scans in Release Pipeline.mp479.46MB
~Get Your Files Here !/4 - Vulnerability Management and Remediation/1 - Generate Security Scanning Reports (4 - Vulnerability Management and Remediation).mp431.78MB
~Get Your Files Here !/4 - Vulnerability Management and Remediation/2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4100.92MB
~Get Your Files Here !/4 - Vulnerability Management and Remediation/3 - Automate Uploading Security Scan Results to DefectDojo.mp4102.12MB
~Get Your Files Here !/4 - Vulnerability Management and Remediation/4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp463.12MB
~Get Your Files Here !/5 - Vulnerability Scanning for Application Dependencies/1 - Software Composition Analysis - Security Issues in Application Dependencies (5 - Vulnerability Scanning for Application Dependencies).mp453.42MB
~Get Your Files Here !/5 - Vulnerability Scanning for Application Dependencies/2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp442.59MB
~Get Your Files Here !/5 - Vulnerability Scanning for Application Dependencies/3 - Overview of Static Security Scans in CI Pipeline.mp44.09MB
~Get Your Files Here !/6 - Build a CD Pipeline/1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp48.1MB
~Get Your Files Here !/6 - Build a CD Pipeline/2 - Introduction to Security Layers for AWS Access.mp430.22MB
~Get Your Files Here !/6 - Build a CD Pipeline/3 - Integrate CICD Pipeline with AWS ECR.mp470.02MB
~Get Your Files Here !/6 - Build a CD Pipeline/4 - Configure Application Deployment Environment on EC2 Server.mp435.76MB
~Get Your Files Here !/6 - Build a CD Pipeline/5 - Deploy Application to EC2 Server with Release Pipeline.mp456.3MB
~Get Your Files Here !/6 - Build a CD Pipeline/6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp456.14MB
~Get Your Files Here !/6 - Build a CD Pipeline/7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp482.74MB
~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/1 - Overview of Image Security (7 - Image Scanning - Build Secure Docker Images).mp45.41MB
~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/2 - Configure Automated Security Scanning in Application Image.mp464.14MB
~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/3 - Analyze & Fix Security Issues from Findings in Application Image.mp479.65MB
~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/4 - Automate Uploading Image Scanning Results in DefectDojo.mp433.12MB
~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/5 - Docker Security Best Practices.mp438.5MB
~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/6 - Configure Automated Image Security Scanning in ECR Image Repository.mp444MB
~Get Your Files Here !/7 - Image Scanning - Build Secure Docker Images/7 - Overview of Automated Application Code and Image Scanning Steps.mp42.97MB
~Get Your Files Here !/8 - AWS Cloud Security & Access Management/2 - Understand AWS Access Management using IAM Service.mp47.24MB
~Get Your Files Here !/8 - AWS Cloud Security & Access Management/3 - Securing AWS Root User Account.mp423.79MB
~Get Your Files Here !/8 - AWS Cloud Security & Access Management/4 - IAM Users, Groups & Policies.mp427.03MB
~Get Your Files Here !/8 - AWS Cloud Security & Access Management/5 - Secure Access from CICD Pipeline to AWS.mp446.81MB
~Get Your Files Here !/8 - AWS Cloud Security & Access Management/6 - Understand Importance of IAM Roles in AWS Cloud Security.mp418.16MB
~Get Your Files Here !/8 - AWS Cloud Security & Access Management/7 - Overview of IAM Resources & Secure Access Management in AWS.mp49.18MB
~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/1 - Security Essentials for Accessing Deployment Server (9 - Secure Continuous Deployment & DAST).mp427.93MB
~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/2 - Configure AWS Systems Manager for EC2 Server.mp441.49MB
~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/3 - AWS SSM Commands in Release Pipeline for Server Access.mp446.16MB
~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/4 - Secure Continuous Deployment to Server using SSM.mp465.44MB
~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp457.85MB
~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/6 - Overview of AWS Security Measures and Continuous Security Improvements.mp410.37MB
~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/7 - Understand Dynamic Application Security Testing (DAST).mp431.16MB
~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/8 - Configure Automated DAST Scans in CICD Pipeline.mp472.8MB
~Get Your Files Here !/9 - Secure Continuous Deployment & DAST/9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp47.4MB