Загрузка страницы

Overview of DevSecOps | What is DevSecOps | DevSecOps : What, Why and How | Infosectrain

DevSecOps is a crucial methodology that ensures security is integrated into every step of the software development lifecycle. In this comprehensive guide, we delve into the concept of DevSecOps, exploring its core principles, benefits, and best practices. Whether you're a developer, security professional, or project manager, this video equips you with the knowledge to securely automate your software development process. Join us in understanding the importance of prioritizing security measures and implementing them seamlessly within the DevOps framework. Don't miss out on this valuable resource to enhance your organizations' software security posture.

InfosecTrain offers DevSecOps Training & Certification. To know more about DevSecOps course and other training we conduct, please write into us at sales@infosectrain.com

➡️ Agenda of the Session
• Evolution of Application Security till DevSecOPs
• What is DevSecOps (or alike terms – Sec DevOps, Secure SDLC)
• DevSecOps Tracks
• DevSecOps Pre-requisites
• DevSecOps Culture Change
• DevSecOps Triage, Process
• DevSecOps Road Ahead

Subscribe to our channel for more informative videos on software development, cybersecurity, and DevOps-related topics.

00:00 Introduction
05:30 Security Evolution
08:30 Application Security Evolution
12:50 Owasp Top 10
30:00 Software Development Evolution
34:10 Evolution
36:05 DevSecops
37:45 Application Attack Surface
51:40 DevSecops Maturity Model - Tracks
01:29:05 Track -1
01:45:10 Track -2
01:58:50 DevSecops Maturity Model : Level -2
01:59:25 Track 3
02:16:22 Track -4
02:37:15 Track -5
02:51:10 Track -6
03:13:55 Track -7
03:30:15 Track -8
04:09:30 DevSecOps - Good to Have Pre Requisites
04:11:40 DevSecOps - Key Stakeholders
04:13:38 DevSecOps - Key Processes
04:26:25 DevSecOps - Road Map

Practical DevSecOps Online Training:
InfosecTrain’s DevSecOps: Practical Approach provides participants with comprehensive, hands-on expertise in implementing DevSecOps practices in Docker and Kubernetes environments, focusing on Spring Boot applications.
View More: https://www.infosectrain.com/courses/practical-devsecops-training/

✅ Thank you for watching this video! For more details or to get a free demo with our expert, just give us a heads up at sales@infosectrain.com

Subscribe to our channel to get video updates. Hit the subscribe button.
✅ Facebook: https://www.facebook.com/Infosectrain/
✅ Twitter: https://twitter.com/Infosec_Train
✅ LinkedIn: https://www.linkedin.com/company/infosec-train/
✅ Instagram: https://www.instagram.com/infosectrain/

#DevSecOps #SoftwareDevelopment #SecureAutomation #SoftwareSecurity #DevOpsFramework #Cybersecurity #BestPractices #SecureCoding #devsecopsTraining #infosectrain
✅ Telegram: https://t.me/infosectrains
✅ Website: https://www.infosectrain.com/

Видео Overview of DevSecOps | What is DevSecOps | DevSecOps : What, Why and How | Infosectrain канала INFOSEC TRAIN
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
2 июня 2020 г. 20:08:19
04:37:23
Другие видео канала
What is Sniffing? | Types of Sniffing | Sniffing TechniquesWhat is Sniffing? | Types of Sniffing | Sniffing TechniquesDay -1 Cyber Security Fundamentals | Introduction to Cybersecurity | InfosecTrainDay -1 Cyber Security Fundamentals | Introduction to Cybersecurity | InfosecTrainWhat is SOC? | SOC -The Central Nervous System of Security (Day -1)What is SOC? | SOC -The Central Nervous System of Security (Day -1)𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝐌𝐨𝐧𝐭𝐡 : 𝐗 - 𝐗𝐒𝐒 (𝐂𝐫𝐨𝐬𝐬-𝐒𝐢𝐭𝐞 𝐒𝐜𝐫𝐢𝐩𝐭𝐢𝐧𝐠) 𝐀𝐭𝐭𝐚𝐜𝐤𝐬𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝐌𝐨𝐧𝐭𝐡 : 𝐗 - 𝐗𝐒𝐒 (𝐂𝐫𝐨𝐬𝐬-𝐒𝐢𝐭𝐞 𝐒𝐜𝐫𝐢𝐩𝐭𝐢𝐧𝐠) 𝐀𝐭𝐭𝐚𝐜𝐤𝐬CISSP Success Stories | Sumit CISSP Gladiator | CISSP InfosecTrain ReviewCISSP Success Stories | Sumit CISSP Gladiator | CISSP InfosecTrain ReviewCloud storage security | Cloud Networking Security | Introduction to AWS infrastructureCloud storage security | Cloud Networking Security | Introduction to AWS infrastructureWhat is Cloud Security Practitioner?  | Cloud Security Practitioner | InfosecTrainWhat is Cloud Security Practitioner? | Cloud Security Practitioner | InfosecTrainIdentity, Governance, Privacy & Compliance | Learn Microsoft Azure FundamentalsIdentity, Governance, Privacy & Compliance | Learn Microsoft Azure Fundamentals𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝐌𝐨𝐧𝐭𝐡 : 𝐎 - 𝐎𝐧𝐥𝐢𝐧𝐞 𝐏𝐫𝐢𝐯𝐚𝐜𝐲𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝐌𝐨𝐧𝐭𝐡 : 𝐎 - 𝐎𝐧𝐥𝐢𝐧𝐞 𝐏𝐫𝐢𝐯𝐚𝐜𝐲What is AWS Security and Penetration Testing ? | AWS Penetration Testing Concept | Infosec TrainWhat is AWS Security and Penetration Testing ? | AWS Penetration Testing Concept | Infosec TrainDay:5 Free Bootcamp Cybersecurity Essentials by Ashish Dhyani | InfosecTrainDay:5 Free Bootcamp Cybersecurity Essentials by Ashish Dhyani | InfosecTrainWhen Your Manager Drops the 'Work Bomb' Right on Cue!When Your Manager Drops the 'Work Bomb' Right on Cue!What is a Three-Way Handshake in TCP? | TCP 3 way Handshake | InfosecTrainWhat is a Three-Way Handshake in TCP? | TCP 3 way Handshake | InfosecTrainCISA Practice Questions | CISA Exam Preparation | CISA Q&A Part 3 | InfosecTrainCISA Practice Questions | CISA Exam Preparation | CISA Q&A Part 3 | InfosecTrainCCSK Infosectrain Review | CCSK Success Stories | Sathyapriya G CCSK GladiatorCCSK Infosectrain Review | CCSK Success Stories | Sathyapriya G CCSK GladiatorCISSP InfosecTrain Review | ANWAR CISSP Gladiator | CISSP Success StoriesCISSP InfosecTrain Review | ANWAR CISSP Gladiator | CISSP Success Stories𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝐌𝐨𝐧𝐭𝐡 : 𝐌 - 𝐌𝐨𝐛𝐢𝐥𝐞 𝐃𝐞𝐯𝐢𝐜𝐞 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝐌𝐨𝐧𝐭𝐡 : 𝐌 - 𝐌𝐨𝐛𝐢𝐥𝐞 𝐃𝐞𝐯𝐢𝐜𝐞 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲𝐂𝐲𝐛𝐞𝐫𝐰𝐚𝐭𝐜𝐡 𝐖𝐞𝐞𝐤𝐥𝐲 𝐔𝐩𝐝𝐚𝐭𝐞𝐂𝐲𝐛𝐞𝐫𝐰𝐚𝐭𝐜𝐡 𝐖𝐞𝐞𝐤𝐥𝐲 𝐔𝐩𝐝𝐚𝐭𝐞What is Address Resolution Protocol (ARP) | Infosec TrainWhat is Address Resolution Protocol (ARP) | Infosec TrainWhat is cyber security | infosecTrainWhat is cyber security | infosecTrainFREE Webinar – AWS Security Architecture By KrishFREE Webinar – AWS Security Architecture By Krish
Яндекс.Метрика