The Complete DevSecOps Course with Docker and Kubernetes

8 months ago
140

Описание:
DevSecOps stands for development, security, and operations. It's an approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycle. DevOps isn’t just about development and operations teams. If you want to take full advantage of the agility and responsiveness of a DevOps approach, IT security must also play an integrated role in the full life cycle of your apps.

This course is a complete step by step guide for implementing best security practices and tools on your DevOps framework. You will start from the very basics by exploring the DevOps architecture and how it is related to DevSecOps. The you will learn the two main container management platforms: Docker and Kubernetes. You will master container management, working with Docker files, getting and building your own container images and optimizing them.

In the rest of the sections you will master the implementation of the extra security layer on your DevOps tools. Firstly, you will learn how to use the Docker Registry and build a registry on your own. I will show you how to use Docker Content Thrust and protect your docker daemon and host by applying Apparmor and Seccomp security profiles, implementing Docker Bench Security and and auditing the your Docker host. You will also learn how to protect and analyze vulnerabilities your docker images to prevent corruption using Clair, Quay, Anchore and the CVE database. You will explore how to create and manage Docker secrets, networks and port mapping. You will be able to use security monitoring tools such as cAdvisor, Dive, Falco and administration tools such as Portainer, Rancher and Openshift.

Finally you will focus on Kubernetes Security practices. You will learn how to find, solve and prevent Kubernetes security risks and apply best security practices. I will show you how to use KubeBench and Kubernetes Dashboard to enhance your Kubernetes Security and Prometheus and Grafana to monitor and observe our Kubernetes clusters for vulnerabilities.

1. DevOps Architecture
00:12:35 — 2. Creating a Basic Architecture
00:22:56 — 3. DevOps Components

2. DevSecOps Architecture
00:31:05 — 1. Intro to DevSecOps Ecosystem
00:37:59 — 2. DevSecOps Pipeline
00:48:22 — 3. Applying DevSecOps to AWS, Azure and Google Claud
00:58:36 — 4. Deployment and Industry Security Frameworks

3. Container Platforms
01:07:10 — 1. Docker Containers
01:16:16 — 2. Working with Docker
01:23:45 — 3. Podman and Container Management
01:37:30 — 4. Kubernetes

4. Managing Containers and Docker Images
01:48:17 — 1. Managing Docker Images
01:57:03 — 2. Dockerfile Commands
02:06:56 — 3. Managing Docker containers
02:13:46 — 4. Optimizing Docker Images

5. Docker Security
02:32:26 — 1. Docker Security Principals
02:56:03 — 2. Docker Capabilities
03:05:09 — 3. Docker Content Thrust
03:13:12 — 4. Docker Registry

6. Docker Host Decurity
03:23:03 — 1. Daemin Security
03:33:44 — 2. Apparmor and Seccomp Profiles
03:41:47 — 3. Docker Bench Security

7. Docker Images Security
03:54:35 — 1. Docker Hub Repository and Security Scanning
04:07:33 — 2. Scanning Docker Images with Clair and Quay
04:10:55 — 3. Analyzing Docker Images with Anchore

8. Auditing and Analyzing Vulnerabilities in Docker Containers
04:27:37 — 1. Docker Threats and Attacks
04:37:19 — 2. CVE in Docker Images

9. Managing Docker Secrets and Networks
04:42:13 — 1. Managing Secrets in Docker
04:49:38 — 2. Container Networking and Managing in Docker
04:58:04 — 3. Containers Communication and Port Mapping
05:06:01 — 4. Creating and Managing Docker Networks

10. Docker Container Monitoring
05:14:50 — 1. Container Metrics and events
05:21:50 — 2. Performance Monitoring

11. Docker Container Administration
05:27:15 — 1. Administration with Portainer
05:43:23 — 2. Administration with Rancher

12. Kubernetes Architecture
05:45:25 — 1. Kubernetes Architecture
05:54:08 — 2. Kubernetes Objects
06:13:26 — 3. Tools for Deploying Kubernetes

13. Kubernetes Security
06:26:25 — 1. Introduction to Kubernetes Security
06:34:08 — 2. Kubernetes Security Best Practices
06:54:34 — 3. Analyzing Kubernetes Components Security

14. Auditing and Analyzing Vulnerabilities in Kubernetes
07:01:41 — 1. KubeBench Security
07:08:12 — 2. Kubernetes Security Projects and Kubesec
07:17:01 — 3. Analyzing Kubernetes Vulnerabilities with CVEs

15. Monitoring Kubernetes
07:22:32 — 1. Kubernetes Dashboard and Cluster
07:33:44 — 2. Enhancing Observability with Prometheus
07:42:19 — 3. Collecting and Exploring Matrices with Grafana

Loading 2 comments...