A Complete Guide to Modern DevOps Implementation
3.7 (8 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
72 students enrolled

A Complete Guide to Modern DevOps Implementation

Automate your infrastructure, enhance its security using DevOps tools to overcome modern challenges in software delivery
3.7 (8 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
72 students enrolled
Created by Packt Publishing
Last updated 6/2019
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 9 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Explore continuous integration tools and different configuration management tools.
  • Explore Container orchestration with best practices and implement security solutions in the DevOps cycle.
  • Integrate Security into Continuous Delivery workflows for continuous security.
  • Leverage Infrastructure as Code techniques for secure configuration management and provisioning.
  • Eliminate manual security practices such as risk assessments and audits by automating all the verification.
  • Create build configurations to address automation, continuous deployment, containers, and monitoring.
  • Create automatic compliance by using the DevOps Audit Defense Toolkit.
  • Build a continuous feedback loop by automating all security checks throughout the Continuous Delivery pipeline.
Course content
Expand all 107 lectures 09:04:57
+ Professional DevOps
21 lectures 02:52:25

This video provides an overview of the entire course.

Preview 05:40

In this video, understand DevOps and the steps you need to take to excel in the adoption of DevOps in your organization.

   •  Highlight the shortcomings of Agile methodology

   •  Learn how DevOps overcomes the shortcomings of Agile methodology

   •  What is DevOps? What needs to do to excel at DevOps?

What Is DevOps? What Needs to be Done to Excel at DevOps?
07:19

This video will give you an overview of new roles made when SDLC moved to the DevOps domain.

   •  Learn about the new roles working (in coordination) in DevOps

   •  Learn about the responsibilities of these roles

   •  New DevOps Roles

New DevOps Roles
06:19

In this video, learn about the first three major practices of continuous integration, configuration management and continuous delivery.

   •  Learn about the major practices of DevOps and their working domain

   •  Get an overview of DevOps tools/practices in the DevOps Lifecycle

   •  DevOps lifecycle: Continuous Integration, Configuration Management and Continuous Delivery

Continuous Integration, Configuration Management, and Continuous Delivery
06:43

In this video, learn about the three major practices of continuous monitoring, testing, and deployment.

   •  Learn about the major practices of DevOps and their working domain

   •  Get an overview of DevOps tools/practices in the DevOps Lifecycle

   •  DevOps lifecycle: Continuous Monitoring, Testing and Deployment

Continuous Monitoring, Testing, and Deployment
05:06

In this video learn about software configuration management tools (Git).

   •  Get an overview of version control

   •  Get an overview of GitHub and GitHub account

   •  Get an overview Git operations and flow

Software Configuration Management Tools (Git)
09:36

This video will give you an overview of vagrant: lightweight, reproducible, and portable development environments.

   •  Get an overview of vagrant and install vagrant

   •  Get an overview of operations

   •  Get an overview of provisioning

Vagrant – Lightweight, Reproducible, and Portable Development Environments
09:36

In this video learn about the first three major practices of continuous integration, configuration management and continuous delivery.

   •  Get an introduction to Docker

   •  Learn about installation and usage

   •  Understand role of Docker in devops

The Role of Docker in the DevOps Cycle
09:13

In this video learn about the first three major practices of continuous monitoring, testing and deployment.

   •  Get an introduction to Docker networking

   •  Learn about the basic networking

   •  Learn about Docker overlay networks using swarm

Docker Networking
11:41

This video will give you an overview of use cases.

   •  Understand configuration files

   •  Run the microservices as Docker containers

Docker Deep Dive with Use Cases
10:26

In this video understand the configuration management tools with chef, puppet and Ansible.

   •  Learn about Ansible as cm tool

   •  Learn about chef as cm tool

   •  Learn about puppet as cm tool

Configuration Management Tools with Chef, Puppet, and Ansible
05:42

This video will give you an overview of Ansible: provisioning, configuration management, and application deployment tool.

   •  Learn about use cases of Ansible and provisioning

   •  Learn about configuration management

   •  Learn about application deployment

Ansible – Provisioning, Configuration Management, and Application Deployment Too
14:10

In this video learn about the Jenkins: continuous integration and continuous delivery.

   •  Install of Jenkins

   •  Get an introduction to continuous integration using Jenkins

   •  Get an introduction to continuous delivery using Jenkins

Jenkins – Continuous Integration and Continuous Delivery
06:33

In this video learn how to configure Jenkins with Git.

   •  Walk through a sample example

   •  Integrate Git and Jenkins

Configuring Jenkins with Git
06:09

This video will give you an overview of how to manage containerized workloads and services.

   •  Get an introduction to Kubernetes

   •  Understand Kubernetes architecture

   •  Get an hands-on: running Kubernetes locally

Kubernetes – Managing Containerized Workloads and Services
07:28

In this video you will learn about DevOps monitoring solutions using Monit and Nagios.

   •  Get an introduction to monitoring

   •  Learn about Monit: monitoring system

   •  Learn about Nagios: monitoring system

DevOps Monitoring Solutions Using Monit and Nagios
08:04

This video will give you an overview of setup and configure Nagios.

   •  Download and install Nagios

   •  Setup and configure Nagios

Set Up and Configure Nagios
09:32

In this video learn about the infrastructure monitoring using Nagios.

   •  Setup and configure continues

   •  Learn about Nagios monitors infrastructure

Infrastructure Monitoring Using Nagios
08:56

In this video, you will look at some of the best practices. You will take a deep dive into these best practices.

   •  Learn about the different practices in the DevOps lifecycle

Best Practices in DevOps Lifecycle
07:17

This video will give you an overview of best practices of security on DevOps.

   •  Study security in DevOps

   •  Look at the DevSecOps model

   •  Learn the best security practices in DevOps

Security Best Practices in DevOps
06:29

In this video, you will learn about the tools used for security check.

   •  Study the security and pre-commit security tools

   •  Learn about some continuous integration security tools

   •  Study the operations security tools

Tool for Security Checks in Each Cycle of DevOps
10:26
Test your knowledge
5 questions
+ Modern DevOps in Practice
58 lectures 04:19:38

This video will give you an overview about the course.

Preview 04:05

In this video, we will see the tools used and what is the author’s environment.

  • Learn about course tools and authors environment

Tools and Setup
02:10

In this video you will look at what is DevOps

  • Learn what DevOps means

  • Learn about the goals of DevOps

  • Get an introduction to the core set of methodologies and concepts

What Is DevOps?
05:59

DevOps evolved out of necessity in order to resolve some detrimental deficiencies.

  • Understand where did the term DevOps come from

  • Look at the problems that DevOpsis trying to resolve

  • What took place in order to cause the formation of DevOps?

History
01:56

You may have heard some conflicting terminology and references to DevOps. Is DevOps a team, methodology, or philosophy? In this video, we will look at the context of DevOps.

  • Learn what contexts are referenced by the term

  • Learn the key areas of DevOpsin reference to context

  • Translate those areas to the core makeup of DevOps

Context
01:50

In this video, we will look at the people that makeup DevOps.

  • Learn what DevOps means to an organization

  • What does a DevOps engineer do?

  • Learn who performs DevOpsand their roles

People
02:56

Philosophy plays a big part in everyone’s lives. What does philosophy have to do with DevOps? In this video, you will look at the philosophy of DevOps.

  • Is there a difference between culture and philosophy?

  • Can we do DevOps?

  • Grasp the correlation between philosophy, culture, and principals

Philosophy
03:30

In this video we will look at the Cloud technologies can enhance DevOps capabilities.

  • Understand how was cloud computing born?

  • Look at the advantages and disadvantages of cloud services

  • Understand what the cloud can do for DevOps?

Overview
06:33

There are a lot of cloud providers. In this video, you will look at what you should choose to meet your needs

  • Learn what providers are available

  • Discover cloud provider service types

  • Pick a cloud provider

Providers
03:30

This video will get a brief on Azure which is a cloud provider under the Microsoft Umbrella.

  • Look at when did Azure come into service

  • Learn where to get information on Azure

  • Understand the Azure structure

Azure
02:53

In this video, you will look at how can I use Azure

  • Sign up for a free account

  • Learn portal navigation

  • Learn how to manage subscriptions

Azure Fundamentals
10:11

This video will give you a brief on how are resources created and managed?

  • Learn how resource groups work

  • Find resource groups of interest

  • Learn how to use resource groups

Azure Resources
12:50

This video will give you a brief on how VM is created in the Azure portal

  • Pick a VM image

  • Choose a VM type

  • VM ports and networking

Create a Virtual Machine
06:08

In this video, you will look at how access is controlled to resources

  • Use access control

  • Learn about permission inheritance

  • Create a key vault and learn about different kind of permissions

Azure Permissions and Key Vault
04:17

Are there other ways besides the portal to interact with Azure?

  • Learn about the CLI within the portal

  • Learn about command line access tools

  • Learn about the Azure SDK

Azure Portal Alternates
06:08

This video will focus on API which is a very common type of interface for interacting with services.

  • Learn how the REST API documentation works

  • Learn about some common patterns within Azure

  • Learn about the REST API and authentication

Azure REST API
03:45

In this video, you will look at using the Rest API.

  • Usage of tools to make requests

  • Learn what requests are necessary

  • Learn how to request information from the API

Azure REST API and Postman
09:05

This video will give a brief on command line tool that runs natively.

  • Understand CLI documentation and installation

  • Understand CLI behind the scenes

  • Learn about how subscriptions are managed

Azure CLI – Part One
08:06

In this video, you will look at creating resources with the CLI.

  • Look at the differences, advantages, and disadvantages

  • Create resources with the CLI

  • Delete resources

Azure CLI – Part Two
03:05

In this video, you will get a better understanding of what configuration as code is and how it applies to Docker and Kubernetes.

  • Learn what is meant by configuration as code

  • Learn why CaC is advantageous

  • Learn how Docker and Kubernetes uses CaC

Overview
04:11

In this video, you will look at what container orchestration tools are and how are they beneficial?

  • Learn the difference between a container and an image

  • Learn how a container runs on a system

  • Learn what orchestration tools do

Container Orchestration Tools
03:06

In this video, you will see the basics of Docker.

  • Learn to pull an image and where it is stored

  • Learn the Docker image name syntax

  • Learn how to run a container

Docker – Part One
06:07

In this video you will see how to stop containers, tag images, remove containers and images, and build a custom image.

  • Learn how to stop and remove containers

  • Learn how to tag an image

  • Learn how build a Docker image

Docker – Part Two
06:45

This video will give a brief on the tips on optimization, image inspection, and image storage.

  • Learn how to run commands on the same layer

  • Learn how to inspect images

  • Learn how to store images

Docker – Part Three
03:13

In this video, you will see how to create an instance. This video also introduces you to Kubernetes and kubectl.

  • Kubernetes instance options

  • Get cluster credentials

  • Learn how to install kubectl in a Docker image

Kubernetes – Part One
04:18

In this video, you will see KubernetesYAML files.

  • Learn how to define a deployment

  • Learn how to define a service

  • Apply the YAML files to create the objects

Kubernetes – Part Two
03:03

In this video, you will get to understand infrastructure as code.

  • Learn what is meant by infrastructure as code

  • Learn what the problems IaC is trying to solve

  • Learn why IaC is advantageous

Overview – Infrastructure as Code
03:04

In this video, you will look at how to accomplish IaC.

  • Understand languages to use

  • Look at the tools to use

  • Learn the benefits and tradeoffs

Languages and Applications
02:11

In this video, we will look at how to install Terraform.

  • Learn where to find the documentation

  • Choose the correct platform

  • Install Terraform in a container

Terraform Installation
01:49

This video will explain how Terraform works with a multitude of cloud and on-prem services and infrastructure.

  • Learn where to go for documentation

  • Learn how to tag an image

  • Learn how build a Docker image

Terraform Provider
01:56

In this video, you will learn how to protect secrets and how to use variables.

  • Learn where to go for documentation

  • Learn variable properties

  • Learn about different variable input types

Terraform Variables
03:30

In this video, you will learn how to create a resource group.

  • Learn where to go for documentation

  • Learn about the block signature

  • Learn about the structure of a resource block

Create Resource Group
02:49

In this video, you will look at how to create a key vault.

  • Learn where to go for documentation

  • Learn about resource referencing

  • Learn how to add inner blocks and their requirements

Create Key Vault
03:13

In this video, you will see what is a pipeline

  • Learn the definition of a pipeline

  • Learn what a pipeline does

  • Learn how it applies to DevOps

Overview of Pipeline
08:40

In this video, you will see what pipeline orchestration tools are out there and how do I choose

  • Learn what popular tools exist

  • Learn some guidelines on how to choose

  • Analyze the options

Pipeline Orchestration Tools
01:07

This video will explain how do I get started and use Azure DevOps

  • Learn how to navigate

  • Learn about Git and repos

  • Learn how to create a build pipeline

Azure DevOps – Part One
07:08

This video will explain how do I edit a build and create and configure a release?

  • Learn how to edit a build pipeline

  • Lean how to create a release pipeline

  • Learn how to configure artifact filters and approvers

Azure DevOps – Part Two
06:08

In this video, you will look at the benefits and advantages of the visual editor and YAML file methods.

  • Learn about the advantages and disadvantages of the visual editor

  • Learn about the advantages and disadvantages of the YAML configuration

  • Some finial thoughts on choosing a method

Console versus YAML Configuration
02:16

In this video, we will look at what is monitoring and logging

  • Learn the definition

  • Learn what to monitor

  • Learn when to monitor

Overview
02:04

In this video, you will look at what tools are available for logging and monitoring

  • Learn about what popular tools exist

  • Learn how to view metrics in Azure

  • Learn about the logs query console

Tools
04:57

In this video, you will look at what is scripting

  • Learn what scripting means

  • Learn about some popular scripting languages

  • Learn what pitfalls may arise with different languages

Overview - Scripting Automation and Custom Tools
03:07

In this video, you will look at the tools available for logging and monitoring

  • Learn about the format of bash scripts

  • Learn how to use arguments

  • Learn how to make options

Scripting – Part 1
08:09

This video will give you a brief on how can we use powershell to script

  • Learn about params

  • Learn about syntax

  • Learn about functions

Scripting – Part 2
01:36

This video will give you a brief on how can we make custom tools to elevate our DevOps?

  • Learn how to zone in on a specific function for the tool

  • Learn about options

  • Learn about implementation

Custom Tools
04:34

In this video, you will look at what are the project details

  • Learn the scenario

  • Learn about the team

  • Learn about the applications

Overview – Course Project
01:41

This video will give a brief idea on how do we get started

  • Learn how to create a project

  • Get your bearings on the tool layout

  • Learn about the boards

Azure DevOps Project Creation
02:45

This video will give you a brief on how do we setup the teams and boards

  • Learn how to invite team members

  • Learn how to add teams

  • Learn about creating tickets

Setup the Teams and Planning Boards
03:43

In this video, you will see how do we setup repos and clone them

  • Learn about access tokens

  • Learn about project organization

  • Learn how to clone repos

Setup Repositories
04:19

In this video, you will see how can we enforce best practices and policies

  • Learn about branch labels

  • Learn about branch policies

  • Learn about build validation

Set Branch Policies and Defaults
04:53

In this video, you will see what are the needed resources and how do we create them

  • Learn about the team resources requirements

  • Learn how to organize a terraform project

  • Learn about terraform resource composition

Create Azure Resources – Part One
04:46

In this video, you will see how do we create more of the resources

  • Learn to add key vaults

  • Learn how to manage multiple resources

  • A word about terraform and modules

Create Azure Resources – Part Two
03:43

In this video, you will see how do we create more of the resources?

  • Learn how to create container registry created

  • Learn about admin enabled

  • Learn about data blocks

Create Azure Resources – Part Three
02:57

This video will brief you on how we can manage secrets and dynamic data?

  • Learn about access policies and Terraform

  • Learn about what to manage with Terraform

  • Learn about the project secrets

Secrets and Variables
06:02

This video will give a brief on how do we create a build definition

  • Learn about the azure pipeline yaml

  • Learn how to reference variable groups

  • Learn about build steps

CI Build Definitions
08:05

In this video, you will see how do we create a release definition

  • Learn how to use tools in the release pipeline

  • Learn about how artifacts are used in the release

  • Learn how to use variable groups in environments

CD Release Definitions – Part 1
05:31

In this video, we will see how do we work more with the release

  • Learn how to define secrets

  • Learn more about injecting variables

  • Learn about some common errors and fixes

CD Release Definitions – Part 2
04:40

In this video, we will see how do we add multiple environments

  • Learn to create multiple environments

  • Learn about pre and post conditions

  • Learn about namespaces

CD Release Definitions – Part 3
06:05

This video we will see how do we monitor

  • Learn about Azure monitoring

  • Learn about AKS monitoring

  • Learn about logs and alerts

Monitoring
02:30
Test your knowledge
3 questions
+ Practical DevOps Security
28 lectures 01:52:54

This video will give you an overview about the course.

Preview 02:27

The traditional techniques of security verification are simply not adequate for this new paradigm. In this video you will see how digitalization and adoption of agile and DevOps practices has changed the way we create software.

  • Deliver incremental software quickly

  • Explore adoption of DevOps practices

  • Learn the advantages of adopting DevOps practices

Integrate Security for a DevOps World
05:03

This video will give you a glimpse of severity of cyberattacks and you’ll see how to manage security risks in a rapidly changing world by adoption of DevOps principles.

  • Learn about the continuous security assessment for making safe and secure software

  • Embed security checks and verifications at different points of DevOps pipeline

  • Fail fast, through automation and security integrating with development tools

Risk Management in a Rapidly Changing World
06:27

In this video you will see the basic principles to be followed for a successful DevOps adoption. You will also see the benefits accrued out of it.

  • Add robust security methods to traditional DevOps practices from day 1

  • Learn the “Secure by Design" principle along with code review and security testing

  • Learn about cost reduction by detecting and fixing security issues early

Key Principles and Benefits of Secure DevOps
04:46

In this video you will see the strategy for transformation from DevOps to DevSecOps.

  • Explore the team approaches to handle security challenges

  • Address all the three areas of People, Process and Technology

Business-Driven Security Strategies
04:05

In this video you will get to see the awesome work being done by OWASP around security.

  • Obtain unbiased, practical information about application security

  • Explore the OWASP resources and community

  • Explore the OWASP top 10 vulnerabilities

OWASP Security Guidelines
03:59

In this video you will see how digitalization and adoption of agile and DevOps practices has changed the way we create software. The traditional techniques of Security verification are simply not adequate for this new paradigm.

  • Explore Shift-Left Security checks and verifications

  • Learn about AppSec Pipelines

  • Know more about consistent processes

Integrating Security Into CI/CD Pipeline
03:16

This video covers the best practices for automating different types of security tests.

  • Know that application security solutions need to evolve with changing times

  • Learn about the application security need that has been intensified with increasing risks

  • Build a comprehensive automated security testing strategy

Automated Security Testing
03:22

This video showcases the various tools which are available for performing different types of security tests and scans.

  • Choose appropriate tools from different open source and commercial options

  • Explore the tools introduced by OWASP

Tools of the Trade
02:47

In this video you will see the importance of Red and Blue teams, which are two distinct teams of security professionals who are all working for the betterment of the company, but doing it in opposing ways.

  • Approach to test resilience against any attack

  • Learn the two-pronged strategy to attack and defend

  • Perform an exercise to provide opportunity to challenge organization’s defenses realistically

Red and Blue Teams
02:59

In this video you will see how proper planning is quite crucial to address security requirements.

  • Define proper functional and non-functional requirements.

  • Take the first step which is to identify all the risks

  • Explore the security user stories for various stakeholders - User, Admin, Business Owner

Security Requirements
03:58

In this video you will see how to take care of security principles during design and architecture phase.

  • Get to think about security from architecture phase

  • Identify the core pillars of secure architecture - Confidentiality, Integrity, Availability

  • Follow best practices for a secure architecture

Architectural Considerations
02:34

This video shows how to apply the techniques of threat modelling, data flow diagrams and attack surface to build a secure and robust design. This would lay the foundation of a secure software.

  • Identify the important assets and protect them

  • Learn the iterative process from design and throughout the application life-cycle

  • Learn about STRIDE model

Threat Modeling, Data Flow Diagrams, and Attack Surface
07:51

This video explores the importance of proper Identity and access management to allow only authorized users to access the system and resources.

  • Create, maintain, and use digital identities

  • Learn the major steps for inventory management– Define, Map, Assign

  • Manage identity and access across different phases – Discover, Harvest, Refine.

Identity and Access Management
03:05

This video demonstrates the significance of performing code reviews in order to discover vulnerabilities and security related weaknesses.

  • Augment standard code review practice with security considerations

  • Secure code reviews look for software weakness early on

  • Check for areas more prone to weaknesses

Code Inspection
03:34

The aim of this video is to learn about the security hardening.

  • Explore the importance of hardening

  • Study the hardening lifecycle

  • Take a look at the different automation tools

Environment Hardening
05:59

In this video you will see how Static Application Security Testing helps in finding vulnerabilities earlier in the development cycle.

  • Analyze software during coding and unit testing phase

  • Scan source code and look in binaries and configuration files

  • Judiciously chose static analysis tools to perform static application testing

What Is Static Application Security Testing?
04:18

In this video you will see how to perform Static Application Security Testing by embedding SonarQube into CI/CD pipeline.

  • Demonstrate static analysis testing

  • Explore the use of WebGoat, a deliberate vulnerable application

  • Learn about SonarCloud

Embed SAST into the CI/CD Pipeline
07:18

This video explorers how Dynamic Application Security Testing helps in finding vulnerabilities on a running application.

  • Analyze running application for weaknesses

  • Learn about black-box testing where attacks are performed on running application

  • Judiciously chose dynamic analysis tools to perform dynamic application testing

What Is Dynamic Application Security Testing?
02:23

In this video you will see how to perform Dynamic Application Security Testing by embedding Zed Attack Proxy into CI/CD pipeline.

  • Demonstrate dynamic analysis testing

  • Explore the use of WebGoat, a deliberate vulnerable application

  • Know more about ZAP

Embed DAST Into the Pipeline
03:02

This video showcases newer techniques of performing Security Analysis Testing.

  • Instrument code for performing novel security testing and protection

  • Use IAST to detect vulnerabilities in a running application

  • Use RASP to prevent vulnerabilities from being exploited

Continuous Security - The DevOps Way
02:18

In this video you will see how to audit the open-source components being used in any application.

  • Make sure that the safe and secure open-source components are being used

  • Track usage of OSS components

  • Set up policies around vulnerability management and license compliance

Software Composition Analysis
02:01

In this video you will see how configuration of infrastructure should be secured.

  • Identify and mitigate risks to infrastructure configuration

  • Follow best practices - Isolation, Firewall and Identity based access

  • Use Docker container for a safe and secure environment

Infrastructure as Code
03:40

In this video you will see how key management and identity management provides safe access to your applications.

  • Explore management of encryption keys through their entire lifecycle

  • Use KMS to provide organization exclusive custody of encryption keys

  • Use identity management to control user information

Key Management and Identity Management
02:16

In this video you will see how companies like Netflix continuously test their production environment with various kinds of chaos. You will also see how fuzz testing can be used to expose system vulnerabilities against malicious input.

  • Provide seamless service in distributed / cloud computing environment

  • Simulate production environment with various failure scenarios

  • Learn about the fuzzing technique

Chaos Monkey and Fuzz Testing
02:19

In this video you will see how a system should be monitored for security related incidents.

  • Leverage both security information and event management

  • Monitor for violations and assign distinct categories

  • Know what the judiciously chosen metrics provide

Security Monitoring
05:48

In this video you will see the benefits of good Governance practices and regular audits.

  • Manage organization's overall governance, risk management and compliance with regulations

  • Track metrics across application security process, risk and SDLC

  • Learn more about regular audits

Governance, Risk, Compliance and Audit
03:59

In this video you will see how to respond to security incidents and perform digital forensics to contain the impact and prevent future incidents.

  • Learn about having a proper incident response emergency plan

  • Aim to prevent incidents by identifying trends in the adversary community

  • Learn that Proper Incident Response minimizes losses and mitigates the exploited weakness

Incident Response and Forensics
07:20
Test your knowledge
5 questions
Requirements
  • Basic understanding of DevOps, Cloud computing, automation frameworks, and programming skills would be beneficial.
  • However, you need to have a basic understanding or working experience with Linux, and an understanding of the IT environment.
Description

If you’re facing issues of decreased frequency of deployment, high new releases failure rate and longer lead time between fixes than modern DevOps is the answer to your problems. DevOps enables rapid application development and follows a traditional way of performing security checks. It helps an organization deploy software while maintaining service stability. If you’re looking to protect your organization with the collaboration of DevOps and security then, this is the perfect Course for you!

This comprehensive 3-in-1 course takes a step-by-step practical approach to automate your infrastructure and overcome day-to-day IT infrastructure challenges as well as protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework. You’ll initially implement a complete DevOps cycle with use cases and explore continuous integration and different configuration management tools using Chef, Puppet, and Ansible. You’ll also implement DevOps using Docker containers. Moving further, you’ll add resilient services to your app or infrastructure using configuration management, continuous deployment, and other DevOps techniques. Finally, you’ll build a continuous feedback loop by automating all security checks throughout the Continuous Delivery pipeline.

Towards the end of this course, you'll implement configuration management, monitoring, and security using DevOps tools and technology framework.

Contents and Overview

This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.

The first course, Professional DevOps, covers DevOps tools and technology frameworks to implement DevOps for your organization. This course helps you implement a complete DevOps cycle in your existing IT environment. Each section of this course will help you implement the DevOps culture in your professional environment. With the help of source control, continuous build, continuous integration, automated test with quality controls, and container technologies, this course will be your perfect guide to learn and apply DevOps in your organization. By the end of this course, you’ll be able to identify and choose the appropriate tools and technology framework to implement DevOps in your organization.

The second course, Modern DevOps in Practice, covers how to implement cutting edge solutions to improve your development operations. Modern DevOps in Practice will introduce you to modern Development Operations (DevOps), how to utilize it in your development environment work with tools (Terraform and Azure DevOps). After this course you’ll be able to bring more automation and standardization to the development process, human errors can be significantly reduced and it will be best practices more efficiently shared across teams. Continuous delivery will help you save time setting up and fixing your working environments. Additionally, you will learn about the fundamental principles of DevOps and how to transform your team into one that follows the core of DevOps. By the end of this course, you will feel comfortable with what DevOps learn how to utilize modern day tools to better ship code and provide high availability environments.

The third course, Practical DevOps Security, covers protecting your organization with the collaboration of DevOps and security. This course shows you how to apply DevOps security best practices at every stage in your DevOps pipeline. You will learn proven approaches to reducing vulnerability and strengthening your defenses against attack. You will understand using security as code with the intent of making security and compliance consumable as a service. This course explains how DevOps security practices differ from traditional security approaches and provide techniques to embed governance and cybersecurity functions throughout the DevOps workflow. By the end of the course, you will have learned best practices in DevSecOps, the core concepts of secure DevOps, and how security can be integrated into the development pipeline.

By the end of this course, you'll implement configuration management, monitoring, and security using DevOps tools and technology framework.

About the Authors

  • Umar Murtaza has more than 25 years’ experience of System Administration in implementing, commissioning development, testing, and production environments. He has designed and implemented a number of DevOps environments, conducted 4- day hands-on DevOps training sessions at a number of private and government telecommunications and software companies/institutions.


  • Cory W. Cordell is a focused technologist that has a great passion for Software Engineering and DevOps. He believes that the application of DevOps principles is essential in staying competitive in today's technologically sophisticated market.


  • Gurpreet Sachdeva is a Technology Executive with 21+ years' experience working on some of the most challenging technologies related to Cloud Computing, DevOps, and Security. Gurpreet did his B. Tech (C.S.) from NIT, Kurukshetra, and M.S. (Software Systems) from BITS, Pilani. He is currently working as Assistant Vice President—Technology with Aricent, Gurgaon. He is a keen Java enthusiast and co-founder of Delhi – NCR – Java User Group. Gurpreet is an invited speaker in prestigious conferences such as Oracle – Java One, Great India Developer Summit. He blogs at thistechnologylife and has written a book on Elastic stack.

Who this course is for:
  • This Course is perfect for:
  • System Administrators, Solution Architects, DevOps Engineers, Security Consultant, Cloud Security Strategists who want to understand the concept of building a DevOps strategy from scratch and are looking to use the principles of DevOps to secure their software in a continuous and iterative manner!