Overview of DevSecOps | What is DevSecOps | DevSecOps : What, Why and How | Infosectrain
DevSecOps is a crucial methodology that ensures security is integrated into every step of the software development lifecycle. In this comprehensive guide, we delve into the concept of DevSecOps, exploring its core principles, benefits, and best practices. Whether you're a developer, security professional, or project manager, this video equips you with the knowledge to securely automate your software development process. Join us in understanding the importance of prioritizing security measures and implementing them seamlessly within the DevOps framework. Don't miss out on this valuable resource to enhance your organizations' software security posture.
InfosecTrain offers DevSecOps Training & Certification. To know more about DevSecOps course and other training we conduct, please write into us at sales@infosectrain.com
➡️ Agenda of the Session
• Evolution of Application Security till DevSecOPs
• What is DevSecOps (or alike terms – Sec DevOps, Secure SDLC)
• DevSecOps Tracks
• DevSecOps Pre-requisites
• DevSecOps Culture Change
• DevSecOps Triage, Process
• DevSecOps Road Ahead
Subscribe to our channel for more informative videos on software development, cybersecurity, and DevOps-related topics.
00:00 Introduction
05:30 Security Evolution
08:30 Application Security Evolution
12:50 Owasp Top 10
30:00 Software Development Evolution
34:10 Evolution
36:05 DevSecops
37:45 Application Attack Surface
51:40 DevSecops Maturity Model - Tracks
01:29:05 Track -1
01:45:10 Track -2
01:58:50 DevSecops Maturity Model : Level -2
01:59:25 Track 3
02:16:22 Track -4
02:37:15 Track -5
02:51:10 Track -6
03:13:55 Track -7
03:30:15 Track -8
04:09:30 DevSecOps - Good to Have Pre Requisites
04:11:40 DevSecOps - Key Stakeholders
04:13:38 DevSecOps - Key Processes
04:26:25 DevSecOps - Road Map
Practical DevSecOps Online Training:
InfosecTrain’s DevSecOps: Practical Approach provides participants with comprehensive, hands-on expertise in implementing DevSecOps practices in Docker and Kubernetes environments, focusing on Spring Boot applications.
View More: https://www.infosectrain.com/courses/practical-devsecops-training/
✅ Thank you for watching this video! For more details or to get a free demo with our expert, just give us a heads up at sales@infosectrain.com
Subscribe to our channel to get video updates. Hit the subscribe button.
✅ Facebook: https://www.facebook.com/Infosectrain/
✅ Twitter: https://twitter.com/Infosec_Train
✅ LinkedIn: https://www.linkedin.com/company/infosec-train/
✅ Instagram: https://www.instagram.com/infosectrain/
#DevSecOps #SoftwareDevelopment #SecureAutomation #SoftwareSecurity #DevOpsFramework #Cybersecurity #BestPractices #SecureCoding #devsecopsTraining #infosectrain
✅ Telegram: https://t.me/infosectrains
✅ Website: https://www.infosectrain.com/
Видео Overview of DevSecOps | What is DevSecOps | DevSecOps : What, Why and How | Infosectrain канала INFOSEC TRAIN
InfosecTrain offers DevSecOps Training & Certification. To know more about DevSecOps course and other training we conduct, please write into us at sales@infosectrain.com
➡️ Agenda of the Session
• Evolution of Application Security till DevSecOPs
• What is DevSecOps (or alike terms – Sec DevOps, Secure SDLC)
• DevSecOps Tracks
• DevSecOps Pre-requisites
• DevSecOps Culture Change
• DevSecOps Triage, Process
• DevSecOps Road Ahead
Subscribe to our channel for more informative videos on software development, cybersecurity, and DevOps-related topics.
00:00 Introduction
05:30 Security Evolution
08:30 Application Security Evolution
12:50 Owasp Top 10
30:00 Software Development Evolution
34:10 Evolution
36:05 DevSecops
37:45 Application Attack Surface
51:40 DevSecops Maturity Model - Tracks
01:29:05 Track -1
01:45:10 Track -2
01:58:50 DevSecops Maturity Model : Level -2
01:59:25 Track 3
02:16:22 Track -4
02:37:15 Track -5
02:51:10 Track -6
03:13:55 Track -7
03:30:15 Track -8
04:09:30 DevSecOps - Good to Have Pre Requisites
04:11:40 DevSecOps - Key Stakeholders
04:13:38 DevSecOps - Key Processes
04:26:25 DevSecOps - Road Map
Practical DevSecOps Online Training:
InfosecTrain’s DevSecOps: Practical Approach provides participants with comprehensive, hands-on expertise in implementing DevSecOps practices in Docker and Kubernetes environments, focusing on Spring Boot applications.
View More: https://www.infosectrain.com/courses/practical-devsecops-training/
✅ Thank you for watching this video! For more details or to get a free demo with our expert, just give us a heads up at sales@infosectrain.com
Subscribe to our channel to get video updates. Hit the subscribe button.
✅ Facebook: https://www.facebook.com/Infosectrain/
✅ Twitter: https://twitter.com/Infosec_Train
✅ LinkedIn: https://www.linkedin.com/company/infosec-train/
✅ Instagram: https://www.instagram.com/infosectrain/
#DevSecOps #SoftwareDevelopment #SecureAutomation #SoftwareSecurity #DevOpsFramework #Cybersecurity #BestPractices #SecureCoding #devsecopsTraining #infosectrain
✅ Telegram: https://t.me/infosectrains
✅ Website: https://www.infosectrain.com/
Видео Overview of DevSecOps | What is DevSecOps | DevSecOps : What, Why and How | Infosectrain канала INFOSEC TRAIN
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
What is Sniffing? | Types of Sniffing | Sniffing TechniquesDay -1 Cyber Security Fundamentals | Introduction to Cybersecurity | InfosecTrainWhat is SOC? | SOC -The Central Nervous System of Security (Day -1)𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝐌𝐨𝐧𝐭𝐡 : 𝐗 - 𝐗𝐒𝐒 (𝐂𝐫𝐨𝐬𝐬-𝐒𝐢𝐭𝐞 𝐒𝐜𝐫𝐢𝐩𝐭𝐢𝐧𝐠) 𝐀𝐭𝐭𝐚𝐜𝐤𝐬CISSP Success Stories | Sumit CISSP Gladiator | CISSP InfosecTrain ReviewCloud storage security | Cloud Networking Security | Introduction to AWS infrastructureWhat is Cloud Security Practitioner? | Cloud Security Practitioner | InfosecTrainIdentity, Governance, Privacy & Compliance | Learn Microsoft Azure Fundamentals𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝐌𝐨𝐧𝐭𝐡 : 𝐎 - 𝐎𝐧𝐥𝐢𝐧𝐞 𝐏𝐫𝐢𝐯𝐚𝐜𝐲What is AWS Security and Penetration Testing ? | AWS Penetration Testing Concept | Infosec TrainDay:5 Free Bootcamp Cybersecurity Essentials by Ashish Dhyani | InfosecTrainWhen Your Manager Drops the 'Work Bomb' Right on Cue!What is a Three-Way Handshake in TCP? | TCP 3 way Handshake | InfosecTrainCISA Practice Questions | CISA Exam Preparation | CISA Q&A Part 3 | InfosecTrainCCSK Infosectrain Review | CCSK Success Stories | Sathyapriya G CCSK GladiatorCISSP InfosecTrain Review | ANWAR CISSP Gladiator | CISSP Success Stories𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝐌𝐨𝐧𝐭𝐡 : 𝐌 - 𝐌𝐨𝐛𝐢𝐥𝐞 𝐃𝐞𝐯𝐢𝐜𝐞 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲𝐂𝐲𝐛𝐞𝐫𝐰𝐚𝐭𝐜𝐡 𝐖𝐞𝐞𝐤𝐥𝐲 𝐔𝐩𝐝𝐚𝐭𝐞What is Address Resolution Protocol (ARP) | Infosec TrainWhat is cyber security | infosecTrainFREE Webinar – AWS Security Architecture By Krish