A Complete Guide to Modern DevOps Implementation
- 9 hours on-demand video
- 1 downloadable resource
- Full lifetime access
- Access on mobile and TV
- Certificate of Completion
Get your team access to 4,000+ top Udemy courses anytime, anywhere.Try Udemy for Business
- Explore continuous integration tools and different configuration management tools.
- Explore Container orchestration with best practices and implement security solutions in the DevOps cycle.
- Integrate Security into Continuous Delivery workflows for continuous security.
- Leverage Infrastructure as Code techniques for secure configuration management and provisioning.
- Eliminate manual security practices such as risk assessments and audits by automating all the verification.
- Create build configurations to address automation, continuous deployment, containers, and monitoring.
- Create automatic compliance by using the DevOps Audit Defense Toolkit.
- Build a continuous feedback loop by automating all security checks throughout the Continuous Delivery pipeline.
In this video, understand DevOps and the steps you need to take to excel in the adoption of DevOps in your organization.
• Highlight the shortcomings of Agile methodology
• Learn how DevOps overcomes the shortcomings of Agile methodology
• What is DevOps? What needs to do to excel at DevOps?
In this video, learn about the first three major practices of continuous integration, configuration management and continuous delivery.
• Learn about the major practices of DevOps and their working domain
• Get an overview of DevOps tools/practices in the DevOps Lifecycle
• DevOps lifecycle: Continuous Integration, Configuration Management and Continuous Delivery
In this video, learn about the three major practices of continuous monitoring, testing, and deployment.
• Learn about the major practices of DevOps and their working domain
• Get an overview of DevOps tools/practices in the DevOps Lifecycle
• DevOps lifecycle: Continuous Monitoring, Testing and Deployment
This video will give you an overview of vagrant: lightweight, reproducible, and portable development environments.
• Get an overview of vagrant and install vagrant
• Get an overview of operations
• Get an overview of provisioning
This video will give you an overview of Ansible: provisioning, configuration management, and application deployment tool.
• Learn about use cases of Ansible and provisioning
• Learn about configuration management
• Learn about application deployment
You may have heard some conflicting terminology and references to DevOps. Is DevOps a team, methodology, or philosophy? In this video, we will look at the context of DevOps.
Learn what contexts are referenced by the term
Learn the key areas of DevOpsin reference to context
Translate those areas to the core makeup of DevOps
In this video, you will look at the benefits and advantages of the visual editor and YAML file methods.
Learn about the advantages and disadvantages of the visual editor
Learn about the advantages and disadvantages of the YAML configuration
Some finial thoughts on choosing a method
The traditional techniques of security verification are simply not adequate for this new paradigm. In this video you will see how digitalization and adoption of agile and DevOps practices has changed the way we create software.
Deliver incremental software quickly
Explore adoption of DevOps practices
Learn the advantages of adopting DevOps practices
This video will give you a glimpse of severity of cyberattacks and you’ll see how to manage security risks in a rapidly changing world by adoption of DevOps principles.
Learn about the continuous security assessment for making safe and secure software
Embed security checks and verifications at different points of DevOps pipeline
Fail fast, through automation and security integrating with development tools
In this video you will see the basic principles to be followed for a successful DevOps adoption. You will also see the benefits accrued out of it.
Add robust security methods to traditional DevOps practices from day 1
Learn the “Secure by Design" principle along with code review and security testing
Learn about cost reduction by detecting and fixing security issues early
In this video you will see how digitalization and adoption of agile and DevOps practices has changed the way we create software. The traditional techniques of Security verification are simply not adequate for this new paradigm.
Explore Shift-Left Security checks and verifications
Learn about AppSec Pipelines
Know more about consistent processes
This video covers the best practices for automating different types of security tests.
Know that application security solutions need to evolve with changing times
Learn about the application security need that has been intensified with increasing risks
Build a comprehensive automated security testing strategy
In this video you will see the importance of Red and Blue teams, which are two distinct teams of security professionals who are all working for the betterment of the company, but doing it in opposing ways.
Approach to test resilience against any attack
Learn the two-pronged strategy to attack and defend
Perform an exercise to provide opportunity to challenge organization’s defenses realistically
In this video you will see how proper planning is quite crucial to address security requirements.
Define proper functional and non-functional requirements.
Take the first step which is to identify all the risks
Explore the security user stories for various stakeholders - User, Admin, Business Owner
In this video you will see how to take care of security principles during design and architecture phase.
Get to think about security from architecture phase
Identify the core pillars of secure architecture - Confidentiality, Integrity, Availability
Follow best practices for a secure architecture
This video shows how to apply the techniques of threat modelling, data flow diagrams and attack surface to build a secure and robust design. This would lay the foundation of a secure software.
Identify the important assets and protect them
Learn the iterative process from design and throughout the application life-cycle
Learn about STRIDE model
This video explores the importance of proper Identity and access management to allow only authorized users to access the system and resources.
Create, maintain, and use digital identities
Learn the major steps for inventory management– Define, Map, Assign
Manage identity and access across different phases – Discover, Harvest, Refine.
This video demonstrates the significance of performing code reviews in order to discover vulnerabilities and security related weaknesses.
Augment standard code review practice with security considerations
Secure code reviews look for software weakness early on
Check for areas more prone to weaknesses
In this video you will see how Static Application Security Testing helps in finding vulnerabilities earlier in the development cycle.
Analyze software during coding and unit testing phase
Scan source code and look in binaries and configuration files
Judiciously chose static analysis tools to perform static application testing
This video explorers how Dynamic Application Security Testing helps in finding vulnerabilities on a running application.
Analyze running application for weaknesses
Learn about black-box testing where attacks are performed on running application
Judiciously chose dynamic analysis tools to perform dynamic application testing
In this video you will see how key management and identity management provides safe access to your applications.
Explore management of encryption keys through their entire lifecycle
Use KMS to provide organization exclusive custody of encryption keys
Use identity management to control user information
In this video you will see how companies like Netflix continuously test their production environment with various kinds of chaos. You will also see how fuzz testing can be used to expose system vulnerabilities against malicious input.
Provide seamless service in distributed / cloud computing environment
Simulate production environment with various failure scenarios
Learn about the fuzzing technique
In this video you will see the benefits of good Governance practices and regular audits.
Manage organization's overall governance, risk management and compliance with regulations
Track metrics across application security process, risk and SDLC
Learn more about regular audits
In this video you will see how to respond to security incidents and perform digital forensics to contain the impact and prevent future incidents.
Learn about having a proper incident response emergency plan
Aim to prevent incidents by identifying trends in the adversary community
Learn that Proper Incident Response minimizes losses and mitigates the exploited weakness
- Basic understanding of DevOps, Cloud computing, automation frameworks, and programming skills would be beneficial.
- However, you need to have a basic understanding or working experience with Linux, and an understanding of the IT environment.
If you’re facing issues of decreased frequency of deployment, high new releases failure rate and longer lead time between fixes than modern DevOps is the answer to your problems. DevOps enables rapid application development and follows a traditional way of performing security checks. It helps an organization deploy software while maintaining service stability. If you’re looking to protect your organization with the collaboration of DevOps and security then, this is the perfect Course for you!
This comprehensive 3-in-1 course takes a step-by-step practical approach to automate your infrastructure and overcome day-to-day IT infrastructure challenges as well as protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework. You’ll initially implement a complete DevOps cycle with use cases and explore continuous integration and different configuration management tools using Chef, Puppet, and Ansible. You’ll also implement DevOps using Docker containers. Moving further, you’ll add resilient services to your app or infrastructure using configuration management, continuous deployment, and other DevOps techniques. Finally, you’ll build a continuous feedback loop by automating all security checks throughout the Continuous Delivery pipeline.
Towards the end of this course, you'll implement configuration management, monitoring, and security using DevOps tools and technology framework.
Contents and Overview
This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible.
The first course, Professional DevOps, covers DevOps tools and technology frameworks to implement DevOps for your organization. This course helps you implement a complete DevOps cycle in your existing IT environment. Each section of this course will help you implement the DevOps culture in your professional environment. With the help of source control, continuous build, continuous integration, automated test with quality controls, and container technologies, this course will be your perfect guide to learn and apply DevOps in your organization. By the end of this course, you’ll be able to identify and choose the appropriate tools and technology framework to implement DevOps in your organization.
The second course, Modern DevOps in Practice, covers how to implement cutting edge solutions to improve your development operations. Modern DevOps in Practice will introduce you to modern Development Operations (DevOps), how to utilize it in your development environment work with tools (Terraform and Azure DevOps). After this course you’ll be able to bring more automation and standardization to the development process, human errors can be significantly reduced and it will be best practices more efficiently shared across teams. Continuous delivery will help you save time setting up and fixing your working environments. Additionally, you will learn about the fundamental principles of DevOps and how to transform your team into one that follows the core of DevOps. By the end of this course, you will feel comfortable with what DevOps learn how to utilize modern day tools to better ship code and provide high availability environments.
The third course, Practical DevOps Security, covers protecting your organization with the collaboration of DevOps and security. This course shows you how to apply DevOps security best practices at every stage in your DevOps pipeline. You will learn proven approaches to reducing vulnerability and strengthening your defenses against attack. You will understand using security as code with the intent of making security and compliance consumable as a service. This course explains how DevOps security practices differ from traditional security approaches and provide techniques to embed governance and cybersecurity functions throughout the DevOps workflow. By the end of the course, you will have learned best practices in DevSecOps, the core concepts of secure DevOps, and how security can be integrated into the development pipeline.
By the end of this course, you'll implement configuration management, monitoring, and security using DevOps tools and technology framework.
About the Authors
Umar Murtaza has more than 25 years’ experience of System Administration in implementing, commissioning development, testing, and production environments. He has designed and implemented a number of DevOps environments, conducted 4- day hands-on DevOps training sessions at a number of private and government telecommunications and software companies/institutions.
Cory W. Cordell is a focused technologist that has a great passion for Software Engineering and DevOps. He believes that the application of DevOps principles is essential in staying competitive in today's technologically sophisticated market.
Gurpreet Sachdeva is a Technology Executive with 21+ years' experience working on some of the most challenging technologies related to Cloud Computing, DevOps, and Security. Gurpreet did his B. Tech (C.S.) from NIT, Kurukshetra, and M.S. (Software Systems) from BITS, Pilani. He is currently working as Assistant Vice President—Technology with Aricent, Gurgaon. He is a keen Java enthusiast and co-founder of Delhi – NCR – Java User Group. Gurpreet is an invited speaker in prestigious conferences such as Oracle – Java One, Great India Developer Summit. He blogs at thistechnologylife and has written a book on Elastic stack.
- This Course is perfect for:
- System Administrators, Solution Architects, DevOps Engineers, Security Consultant, Cloud Security Strategists who want to understand the concept of building a DevOps strategy from scratch and are looking to use the principles of DevOps to secure their software in a continuous and iterative manner!