Skip to navigation
Skip to navigation
Skip to search form
Skip to login form
Skip to footer
Skip to main content
MVP189
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
LEO777
PAREPOS
JAVABET99
KONTAN88
PEWE128
LAGA88
SKY99IDN
BUANA88
BOXING55
DEWISRI88
DEWISRI88
DEWISRI88
MVP189
slot mania
MVP189
situs tergacor
pg slot wallet
Accessibility options
Accessibility profiles
Visual impairment
Seizure and epileptic
Color vision deficiency
ADHD
Learning
Content adjustments
Readable font
Highlight titles
Highlight links
Stop animations
Text size
+
+ +
+ + +
Line height
+
+ +
+ + +
Text spacing
+
+ +
+ + +
Color adjustments
Dark contrast
Light contrast
High contrast
High saturation
Low saturation
Monochrome
Orientation adjustments
Reading guide
Reading Mask
Big black cursor
Big white cursor
Email: it@huph.edu.vn
Email: it@huph.edu.vn
Các khóa học
Link list
Đổi giao diện
Giao diện cũ
Giao diện mới
Learning AI
Machine Learning cơ bản
en
English
Technology
Docker and Kubernetes
Udemy - Ultimate DevSecOps Bootcamp by School of Devops 2025-4
0 students
Last updated
Jul 2025
Enrol now
Overview
Course content
Instructors
About the course
Udemy - Ultimate DevSecOps Bootcamp by School of Devops 2025-4
Show more...
Course content
Sections:
12
•
Activities:
1
•
Resources:
86
Expand all
Section 1
Welcome to this Course
Announcements
1 Welcome to DevSecOps Bootcamp
Section 2
Introduction to DevSecOps
1 Module Intro
Section 3
Setting Up a Learning Environment
1 Module Intro
2 Launching a Kubernetes Cluster with GKE
3 Setting up Firewall Rules
4 Launching a Linux Development Environment
5 Configuring Google Cloud SDK and Kubectl
6 Install Helm Package Manager
Section 4
Building a DevOps Pipeline
1 Module Intro
2 Installing Jenkins with Helm
3 Configuring Jenkins
4 Analyzing the Jenkinsfile Pipeline as a Code
5 Launching a Simple DevOps Pipeline
6 Building an Image with Docker
7 Why use Kaniko to build Container Images
8 Adding the Image Build and Publish Stage to the Pipeline
Section 5
Securing the Supply Chain with SCA
1 Module Intro
2 Using the Dependency Checker for SCA
3 Using Pyraider as a Python SCA
4 Adding the Software Composition Analysis SCA Stage to the Pipeline
5 Scanning Open Source Licenses
6 Setting up Dependency Tracker
7 Troubleshooting Kubernetes Resource Issues
8 Connecting Jenkins with Dependency Tracker
9 Adding SBOM Stage to the Pipeline
10 Cleaning up
Section 6
Static Application Security Testing (SAST)
1 Module Intro
2 Using SCAN slscanio
3 Adding the SAST Stage to the Pipeline
4 Configuring SCA to Fail
5 Fixing Dependency Issues
6 Updating the License Approval List
Section 7
Auditing Container Images
1 Module Intro
2 Linting Images with Dockle
3 Scanning Images for Vulnerabilities with Trivy
4 What Is a Multi Stage Dockerfile
5 Securing Images with a Multi Stage Dockerfile
6 Running a Container as Non Root
7 Configuring Health Checks
8 Adding Image Analysis to the Pipeline
Section 8
Secure Deployment and Dynamic Application Security Testing DAST
1 Module Intro
2 Setting Up ArgoCD
3 Configuring the ArgoCD CLI
4 Kubernetes Deployment Objects
5 Generating Kubernetes YAML Manifests
6 Deploying to Kubernetes with ArgoCD
7 Authorizing Jenkins to Deploy Remotely with Argo
8 Adding an Automated Deploy Stage to the Jenkins Pipeline
9 DAST Scan with ZAP
Section 9
System Security Auditing with IaaC
1 Module Intro
2 Compliance Scanning with InSpec
3 Using the DevSec Hardening Framework
4 Configuring the SSH Pipeline Steps Plugin
5 Troubleshooting SSH in the Pipeline
6 Adding the Compliance Scan to the Pipeline
7 Installing and Configuring Ansible
8 Enforcing Compliance Remediation with Ansible
9 Modifying InSpec Controls
10 Running Daily SecOps Pipeline
Section 10
Securing Kubernetes Deployments
1 Module Intro
2 Setting Up a Single Node Kubernetes Environment
3 Running CIS Benchmark Scans for Kubernetes
4 Hunting for Vulnerabilities with Kube Hunter
5 Scanning the Kubernetes Deployment Code with Kubesec
6 Defining Resource Constraints
7 Configuring the Security Context for a Pod
8 Mounting the Root Filesystem as Read Only
9 Restricting Syscalls with Seccomp
10 Configuring RunAsUser and ServiceAccounts
Section 11
Secrets Management with Vault
1 Module Intro
2 Installing Vault Using Helm
3 Adding Secrets to the Vault
4 Writing Policy and Kubernetes RBAC
5 Injecting a Secret into the Pod
6 Troubleshooting the Vault Policy
7 Customizing Secrets using Templates
8 Rotating Secrets with Vault
Section 12
Runtime Security Monitoring and Remediation
1 Module Intro
2 Installing the Falco Runtime Security Engine
3 Detecting Runtime Anomalies
4 Adding Custom Application Rules
5 Building an Automated Response Engine
6 Deploying Argo Events and Workflow with Falco
7 Troubleshooting Falco on GKE
8 Examining Argo Workflow
9 Response Engine in Action
Instructors
Enrolment options
Udemy - Ultimate DevSecOps Bootcamp by School of Devops 2025-4
Course modified date:
6 July 2025
Udemy - Ultimate DevSecOps Bootcamp by School of Devops 2025-4
Enrolled students:
There are no students enrolled in this course.
Guests cannot access this course. Please log in.
Continue
Enrol now
This course includes
Forums
Resources
Share this course
Scroll to top
×
Close
×
Close