From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
DevOps security
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
DevOps security
- [Instructor] Welcome to this lesson on DevOps security. This is going to be a relatively short lesson where we're just going to deep dive into DevOps security, otherwise known as DevSecOps. So diving in the purpose of DevSecOps is to bridge the silos between different business units to make sure that we're more effectively providing feedback from each of these different phases of usage of applications into the development process. So you can see over here that the different phases of a DevSecOps cycle are meant to be continuous, but typically you might start a project in this plan phase, and then after planning, you would write the code for the application, and then you would build the code to prepare it for deployment. And then after building, you're going to conduct a variety of different tests to ensure both security and functionality, and then you're going to release that build in order for it to deploy. And then finally, the system will be in operations, at which point you…
Contents
-
-
-
(Locked)
Domain 1 overview1m 9s
-
(Locked)
Cloud computing definitions, roles, and responsibilities10m 21s
-
(Locked)
Key cloud computing characteristics6m 24s
-
(Locked)
Building block technologies6m 26s
-
(Locked)
Cloud activities, service capabilities and categories, and deployment models7m 51s
-
Cloud shared considerations6m 51s
-
(Locked)
Impact of related technologies9m 53s
-
(Locked)
Cryptography and key management3m 22s
-
(Locked)
Identity and access control5m 12s
-
(Locked)
Data and media sanitization3m 23s
-
(Locked)
Network security7m 5s
-
(Locked)
Virtualization security8m 6s
-
(Locked)
Common threats3m 16s
-
(Locked)
Security hygiene6m 4s
-
(Locked)
Cloud secure data lifecycle3m 51s
-
(Locked)
Business continuity and disaster recovery in the cloud6m 44s
-
(Locked)
Business impact analysis and functional security requirements6m 51s
-
(Locked)
Service model security considerations and cloud design patterns5m 24s
-
(Locked)
DevOps security2m 45s
-
(Locked)
Verifications and certifications using common standards6m 3s
-
(Locked)
-
-
-
-
-