10-27-2025, 06:17 PM
![[Image: 539499712_359020115_tuto.jpg]](https://img100.pixhost.to/images/617/539499712_359020115_tuto.jpg)
7.09 GB | 12min 27s | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English
Files Included :
FileName :code.zip | Size: (134.3 MB)
FileName :1 - Why learn DevSecOps.mp4 | Size: (9.27 MB)
FileName :2 - Pre-Requisites of Bootcamp.mp4 | Size: (11.25 MB)
FileName :3 - DevSecOps Bootcamp Curriculum Overview.mp4 | Size: (83.18 MB)
FileName :4 - Support and Other Bootcamp Materials.mp4 | Size: (7.52 MB)
FileName :5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4 | Size: (6.25 MB)
FileName :1 - Introduction to Security.mp4 | Size: (5.32 MB)
FileName :2 - Importance of Security & Impact of Security Breaches.mp4 | Size: (48.12 MB)
FileName :3 - How to Secure Systems Against Attacks.mp4 | Size: (12.77 MB)
FileName :4 - Types of Security Attacks - Part 1.mp4 | Size: (74.16 MB)
FileName :5 - Types of Security Attacks - Part 2.mp4 | Size: (73.24 MB)
FileName :6 - OWASP top 10 - Part 1.mp4 | Size: (105.52 MB)
FileName :7 - OWASP top 10 - Part 2.mp4 | Size: (79.77 MB)
FileName :8 - Security in Layers.mp4 | Size: (35.8 MB)
FileName :1 - Understand Impact of IaC in Security & DevSecOps.mp4 | Size: (25.61 MB)
FileName :2 - Terraform Script for AWS Infrastructure Provisioning.mp4 | Size: (61.21 MB)
FileName :3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4 | Size: (25 MB)
FileName :4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4 | Size: (37.31 MB)
FileName :5 - Configure Remote State for Terraform.mp4 | Size: (27.14 MB)
FileName :6 - Add Automated Security Scan to TF Infrastructure Code.mp4 | Size: (35.59 MB)
FileName :7 - Understand IaC Concept Cattle vs Pets.mp4 | Size: (10.8 MB)
FileName :1 - Understand Need for Logging and Monitoring in Security.mp4 | Size: (14.78 MB)
FileName :2 - Introduction to CloudTrail and CloudWatch.mp4 | Size: (14.98 MB)
FileName :3 - CloudTrail Event History.mp4 | Size: (32.32 MB)
FileName :4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4 | Size: (94.67 MB)
FileName :5 - Create CloudWatch Alarm for EC2 Instance.mp4 | Size: (62.64 MB)
FileName :6 - Create Custom Metric Filter for Failed Login Metrics.mp4 | Size: (41.44 MB)
FileName :7 - Configure Alarm for Failed Login Attempts.mp4 | Size: (36.11 MB)
FileName :8 - Configure AWS Budgets for Monthly Usage Costs.mp4 | Size: (22.54 MB)
FileName :9 - Complete Bootcamp Part 1 - Next Steps.mp4 | Size: (4.55 MB)
FileName :1 - Issues with Traditional Approach to Security.mp4 | Size: (38.28 MB)
FileName :2 - Understand DevSecOps.mp4 | Size: (45.26 MB)
FileName :3 - Roles & Responsibilities in DevSecOps.mp4 | Size: (30.48 MB)
FileName :1 - Build a Continuous Integration Pipeline.mp4 | Size: (69.62 MB)
FileName :2 - Impact of Missing Security Insights.mp4 | Size: (10.02 MB)
FileName :3 - Secret Scanning with GitLeaks - Local Environment.mp4 | Size: (49.76 MB)
FileName :4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4 | Size: (64.1 MB)
FileName :5 - False Positives & Fixing Security Vulnerabilities.mp4 | Size: (61.74 MB)
FileName :6 - Integrate SAST Scans in Release Pipeline.mp4 | Size: (79.46 MB)
FileName :1 - Generate Security Scanning Reports.mp4 | Size: (31.78 MB)
FileName :2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4 | Size: (100.92 MB)
FileName :3 - Automate Uploading Security Scan Results to DefectDojo.mp4 | Size: (102.12 MB)
FileName :4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4 | Size: (63.12 MB)
FileName :2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4 | Size: (42.59 MB)
FileName :3 - Overview of Static Security Scans in CI Pipeline.mp4 | Size: (4.09 MB)
FileName :1 - Overview of a CICD Pipeline.mp4 | Size: (8.1 MB)
FileName :2 - Introduction to Security Layers for AWS Access.mp4 | Size: (30.22 MB)
FileName :3 - Integrate CICD Pipeline with AWS ECR.mp4 | Size: (70.02 MB)
FileName :4 - Configure Application Deployment Environment on EC2 Server.mp4 | Size: (35.76 MB)
FileName :5 - Deploy Application to EC2 Server with Release Pipeline.mp4 | Size: (56.3 MB)
FileName :6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4 | Size: (56.14 MB)
FileName :7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4 | Size: (82.74 MB)
FileName :1 - Overview of Image Security.mp4 | Size: (5.41 MB)
FileName :2 - Configure Automated Security Scanning in Application Image.mp4 | Size: (64.14 MB)
FileName :3 - Analyze & Fix Security Issues from Findings in Application Image.mp4 | Size: (79.65 MB)
FileName :4 - Automate Uploading Image Scanning Results in DefectDojo.mp4 | Size: (33.12 MB)
FileName :5 - Docker Security Best Practices.mp4 | Size: (38.5 MB)
FileName :6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4 | Size: (44 MB)
FileName :7 - Overview of Automated Application Code and Image Scanning Steps.mp4 | Size: (2.97 MB)
FileName :1 - AWS Security Essentials.mp4 | Size: (26.97 MB)
FileName :2 - Understand AWS Access Management using IAM Service.mp4 | Size: (7.24 MB)
FileName :3 - Securing AWS Root User Account.mp4 | Size: (23.79 MB)
FileName :4 - IAM Users, Groups & Policies.mp4 | Size: (27.03 MB)
FileName :5 - Secure Access from CICD Pipeline to AWS.mp4 | Size: (46.81 MB)
FileName :6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4 | Size: (18.16 MB)
FileName :7 - Overview of IAM Resources & Secure Access Management in AWS.mp4 | Size: (9.18 MB)
FileName :1 - Security Essentials for Accessing Deployment Server.mp4 | Size: (27.93 MB)
FileName :2 - Configure AWS Systems Manager for EC2 Server.mp4 | Size: (41.49 MB)
FileName :3 - AWS SSM Commands in Release Pipeline for Server Access.mp4 | Size: (46.16 MB)
FileName :4 - Secure Continuous Deployment to Server using SSM.mp4 | Size: (65.44 MB)
FileName :5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp4 | Size: (57.85 MB)
FileName :6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4 | Size: (10.37 MB)
FileName :7 - Understand Dynamic Application Security Testing (DAST).mp4 | Size: (31.16 MB)
FileName :8 - Configure Automated DAST Scans in CICD Pipeline.mp4 | Size: (72.8 MB)
FileName :9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4 | Size: (7.4 MB)
FileName :12 1-Kubernetes-Security-Overview.mp4 | Size: (24.29 MB)
FileName :12 2-Kubernetes-Security-Best-Practices.mp4 | Size: (93.25 MB)
FileName :12 3-Provision-AWS-EKS-Cluster.mp4 | Size: (83.7 MB)
FileName :13 1-Chapter-Introduction.mp4 | Size: (8.13 MB)
FileName :13 2-Role-Based-Access-Control- RBAC.mp4 | Size: (59.99 MB)
FileName :13 3-IAM-Roles-and-K8s-Roles-How-it-works.mp4 | Size: (37.65 MB)
FileName :13 4-Configure-IAM-Roles-and-link-to-K8s-Roles-in-IaC.mp4 | Size: (60.21 MB)
FileName :13 5-Configure-K8s-Role-and-ClusterRole-in-IaC.mp4 | Size: (100.39 MB)
FileName :13 6-Review-and-Test-Access.mp4 | Size: (89.53 MB)
FileName :13 7-Summary- -Wrap-Up.mp4 | Size: (14.76 MB)
FileName :14 1-Using-GitLab-OIDC-in-AWS.mp4 | Size: (38.1 MB)
FileName :14 2-Configure-Authentication-with-GitLab-Identity-Provider.mp4 | Size: (43.15 MB)
FileName :14 3-Pipeline-Configuration-for-establishing-a-secure-connection.mp4 | Size: (81.66 MB)
FileName :14 4-Terraform-Configuration-for-EKS-provisioning.mp4 | Size: (105.72 MB)
FileName :14 5-Summary- -Wrap-Up.mp4 | Size: (19.45 MB)
FileName :15 1-Introduction-to-EKS-Blueprints.mp4 | Size: (15.83 MB)
FileName :15 2-Overview-of-EKS-Add-ons-we-install.mp4 | Size: (36.14 MB)
FileName :15 3-Configure-EKS-Add-ons.mp4 | Size: (70.4 MB)
FileName :15 4-Troubleshooting- -Tuning-Autoscaler.mp4 | Size: (68.48 MB)
FileName :15 5-Access-Token-Expiration.mp4 | Size: (6.13 MB)
FileName :16 1-Chapter-Overview.mp4 | Size: (8.79 MB)
FileName :16 2-ArgoCD-explained- Part-1 -What -Why-and-How.mp4 | Size: (29.92 MB)
FileName :16 3-ArgoCD-explained- Part-2 -Benefits-and-Configuration.mp4 | Size: (66.55 MB)
FileName :16 4-Overview-of-CI-or-CD-Pipelines-to-Git-repositories.mp4 | Size: (27.34 MB)
FileName :16 5-Configure-ArgoCD-in-IaC- Deploy-Argo-Part-1.mp4 | Size: (81.32 MB)
FileName :16 6-IaC-Pipeline-Configuration- Deploy-Argo-Part-2.mp4 | Size: (44.5 MB)
FileName :16 7-Deployment-through-Pipeline-and-Access-Argo-UI- Deploy-Argo-Part-3.mp4 | Size: (51.84 MB)
FileName :16 8-K8s-Manifests-for-Microservices-App-using-Kustomize.mp4 | Size: (75.07 MB)
FileName :16 9-Create-GitOps-Pipeline-to-update-Kustomization-File.mp4 | Size: (76.97 MB)
FileName :16 10-Create-CI-Pipeline-that-triggers-GitOps-Pipeline.mp4 | Size: (29.62 MB)
FileName :16 11-See-Whole-Automated-Workflow-in-Action.mp4 | Size: (31.85 MB)
FileName :17 1-Why-Policy-as-Code.mp4 | Size: (12.27 MB)
FileName :17 2-Introduction-to-Open-Policy-Agent- OPA -and-OPA-Gatekeeper.mp4 | Size: (29.85 MB)
FileName :17 3-How-Gatekeeper-and-OPA-works.mp4 | Size: (26.17 MB)
FileName :17 4-Install-OPA-Gatekeeper-in-Cluster.mp4 | Size: (29.9 MB)
FileName :17 5-Defining-Policies.mp4 | Size: (31.14 MB)
FileName :17 6-Define-Policy-to-reject-NodePort-Service.mp4 | Size: (108.4 MB)
FileName :17 7-Define-Policy-to-reject-Privileged-Containers.mp4 | Size: (62.91 MB)
FileName :17 8-Summary.mp4 | Size: (7.71 MB)
FileName :18 1-Why-Secrets-Manager-are-needed.mp4 | Size: (30.32 MB)
FileName :18 2-Introduction-to-External-Secrets-Operator-in-K8s.mp4 | Size: (10.56 MB)
FileName :18 3-Capabilities-of-Secrets-Management-Tools.mp4 | Size: (9.72 MB)
FileName :18 4-Vault-Capabilities- Vault-Deep-Dive-Part-1.mp4 | Size: (20.5 MB)
FileName :18 5-How-Vault-works- Vault-Deep-Dive-Part-2.mp4 | Size: (34.63 MB)
FileName :18 6-Introduction-to-AWS-Secrets-Manager.mp4 | Size: (13.14 MB)
FileName :18 7-Deploy-External-Secrets-Controller- Demo-Part-1.mp4 | Size: (45.45 MB)
FileName :18 8-Create-SecretStore-and-ExternalSecret.mp4 | Size: (61.43 MB)
FileName :18 9-Use-Secret-in-Microservice- Demo-Part-3.mp4 | Size: (17.38 MB)
FileName :19 1-Chapter-and-Demo-Overview.mp4 | Size: (5.69 MB)
FileName :19 2-Service-Mesh-and-Istio-What -Why-and-How.mp4 | Size: (52.27 MB)
FileName :19 3-Install-Istio-in-K8s-cluster.mp4 | Size: (91.55 MB)
FileName :19 4-Configure-Traffic-Routing.mp4 | Size: (86.77 MB)
FileName :19 5-Configure-a-Secure-Gateway.mp4 | Size: (57.8 MB)
FileName :19 6-mTLS-Deep-Dive.mp4 | Size: (76.24 MB)
FileName :19 7-Authorization-in-Istio-Deep-Dive.mp4 | Size: (47.19 MB)
FileName :19 8-Istio-Policies-vs-K8s-Network-Policies.mp4 | Size: (17.54 MB)
FileName :19 9-Configure-Authorization-Policies.mp4 | Size: (75.86 MB)
FileName :19 10-Wrap-Up.mp4 | Size: (5.09 MB)
FileName :20 1-What-is-Compliance.mp4 | Size: (13.33 MB)
FileName :20 2-What-are-CIS-Benchmarks.mp4 | Size: (41.62 MB)
FileName :20 3-Why-Compliance-as-Code.mp4 | Size: (8.13 MB)
FileName :20 4-Demo-Overview-and-Introduction-to-AWS-Config.mp4 | Size: (44.58 MB)
FileName :20 5-Setting-up-AWS-Config-Rules.mp4 | Size: (49.43 MB)
FileName :20 6-Configure-Auto-Remediation-for-Insecure-Security-Groups-for-EC2-Instances.mp4 | Size: (63.94 MB)
FileName :20 7-Configure-Auto-Remediation-for-CloudTrail-Logging -if-switched-off.mp4 | Size: (27.46 MB)
FileName :20 8-Configure-Compliance-Rules-for-AWS-EKS-Service.mp4 | Size: (41.75 MB)
FileName :20 9-Wrap-Up.mp4 | Size: (5.93 MB)
FileName :21 1-Why-DevSecOps-is-Important.mp4 | Size: (96.08 MB)
FileName :21 2-Driving-Cultural-Change-Real-World-Examples-of-Companies.mp4 | Size: (232.31 MB)
FileName :21 3-How-to-start-implementing-DevSecOps-in-Organizations- Practical-Tips.mp4 | Size: (402.59 MB)
FileName :21 4-Final-Summary -The-DevSecOps-Transformation.mp4 | Size: (228.03 MB)
FileName :22 -Apply-for-the-Certified-DevSecOps-Practitioner-credential- Digital-Badge.mp4 | Size: (57.6 MB)]
Screenshot
![[Image: ZhN3Cx0H_o.jpg]](https://images2.imgbox.com/3a/ba/ZhN3Cx0H_o.jpg)
FileName :code.zip | Size: (134.3 MB)
FileName :1 - Why learn DevSecOps.mp4 | Size: (9.27 MB)
FileName :2 - Pre-Requisites of Bootcamp.mp4 | Size: (11.25 MB)
FileName :3 - DevSecOps Bootcamp Curriculum Overview.mp4 | Size: (83.18 MB)
FileName :4 - Support and Other Bootcamp Materials.mp4 | Size: (7.52 MB)
FileName :5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4 | Size: (6.25 MB)
FileName :1 - Introduction to Security.mp4 | Size: (5.32 MB)
FileName :2 - Importance of Security & Impact of Security Breaches.mp4 | Size: (48.12 MB)
FileName :3 - How to Secure Systems Against Attacks.mp4 | Size: (12.77 MB)
FileName :4 - Types of Security Attacks - Part 1.mp4 | Size: (74.16 MB)
FileName :5 - Types of Security Attacks - Part 2.mp4 | Size: (73.24 MB)
FileName :6 - OWASP top 10 - Part 1.mp4 | Size: (105.52 MB)
FileName :7 - OWASP top 10 - Part 2.mp4 | Size: (79.77 MB)
FileName :8 - Security in Layers.mp4 | Size: (35.8 MB)
FileName :1 - Understand Impact of IaC in Security & DevSecOps.mp4 | Size: (25.61 MB)
FileName :2 - Terraform Script for AWS Infrastructure Provisioning.mp4 | Size: (61.21 MB)
FileName :3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4 | Size: (25 MB)
FileName :4 - Build CICD Pipeline for Infrastructure Code using GitOps Principles.mp4 | Size: (37.31 MB)
FileName :5 - Configure Remote State for Terraform.mp4 | Size: (27.14 MB)
FileName :6 - Add Automated Security Scan to TF Infrastructure Code.mp4 | Size: (35.59 MB)
FileName :7 - Understand IaC Concept Cattle vs Pets.mp4 | Size: (10.8 MB)
FileName :1 - Understand Need for Logging and Monitoring in Security.mp4 | Size: (14.78 MB)
FileName :2 - Introduction to CloudTrail and CloudWatch.mp4 | Size: (14.98 MB)
FileName :3 - CloudTrail Event History.mp4 | Size: (32.32 MB)
FileName :4 - Configure Multi-Region Trail in CloudTrail & Forward Logs to CloudWatch.mp4 | Size: (94.67 MB)
FileName :5 - Create CloudWatch Alarm for EC2 Instance.mp4 | Size: (62.64 MB)
FileName :6 - Create Custom Metric Filter for Failed Login Metrics.mp4 | Size: (41.44 MB)
FileName :7 - Configure Alarm for Failed Login Attempts.mp4 | Size: (36.11 MB)
FileName :8 - Configure AWS Budgets for Monthly Usage Costs.mp4 | Size: (22.54 MB)
FileName :9 - Complete Bootcamp Part 1 - Next Steps.mp4 | Size: (4.55 MB)
FileName :1 - Issues with Traditional Approach to Security.mp4 | Size: (38.28 MB)
FileName :2 - Understand DevSecOps.mp4 | Size: (45.26 MB)
FileName :3 - Roles & Responsibilities in DevSecOps.mp4 | Size: (30.48 MB)
FileName :1 - Build a Continuous Integration Pipeline.mp4 | Size: (69.62 MB)
FileName :2 - Impact of Missing Security Insights.mp4 | Size: (10.02 MB)
FileName :3 - Secret Scanning with GitLeaks - Local Environment.mp4 | Size: (49.76 MB)
FileName :4 - Pre-commit Hook for Secret Scanning & Integrating GitLeaks in CI Pipeline.mp4 | Size: (64.1 MB)
FileName :5 - False Positives & Fixing Security Vulnerabilities.mp4 | Size: (61.74 MB)
FileName :6 - Integrate SAST Scans in Release Pipeline.mp4 | Size: (79.46 MB)
FileName :1 - Generate Security Scanning Reports.mp4 | Size: (31.78 MB)
FileName :2 - Introduction to DefectDojo, Managing Security Findings, CWEs.mp4 | Size: (100.92 MB)
FileName :3 - Automate Uploading Security Scan Results to DefectDojo.mp4 | Size: (102.12 MB)
FileName :4 - Fix Security Issues Discovered in the DevSecOps Pipeline.mp4 | Size: (63.12 MB)
FileName :2 - Import SCA Scan Reports in DefectDojo, Fixing SCA Findings, CVEs.mp4 | Size: (42.59 MB)
FileName :3 - Overview of Static Security Scans in CI Pipeline.mp4 | Size: (4.09 MB)
FileName :1 - Overview of a CICD Pipeline.mp4 | Size: (8.1 MB)
FileName :2 - Introduction to Security Layers for AWS Access.mp4 | Size: (30.22 MB)
FileName :3 - Integrate CICD Pipeline with AWS ECR.mp4 | Size: (70.02 MB)
FileName :4 - Configure Application Deployment Environment on EC2 Server.mp4 | Size: (35.76 MB)
FileName :5 - Deploy Application to EC2 Server with Release Pipeline.mp4 | Size: (56.3 MB)
FileName :6 - Configure Self-Managed GitLab Runner for Pipeline Jobs.mp4 | Size: (56.14 MB)
FileName :7 - Build Application Images on Self-Managed Runner, Leverage Docker Caching.mp4 | Size: (82.74 MB)
FileName :1 - Overview of Image Security.mp4 | Size: (5.41 MB)
FileName :2 - Configure Automated Security Scanning in Application Image.mp4 | Size: (64.14 MB)
FileName :3 - Analyze & Fix Security Issues from Findings in Application Image.mp4 | Size: (79.65 MB)
FileName :4 - Automate Uploading Image Scanning Results in DefectDojo.mp4 | Size: (33.12 MB)
FileName :5 - Docker Security Best Practices.mp4 | Size: (38.5 MB)
FileName :6 - Configure Automated Image Security Scanning in ECR Image Repository.mp4 | Size: (44 MB)
FileName :7 - Overview of Automated Application Code and Image Scanning Steps.mp4 | Size: (2.97 MB)
FileName :1 - AWS Security Essentials.mp4 | Size: (26.97 MB)
FileName :2 - Understand AWS Access Management using IAM Service.mp4 | Size: (7.24 MB)
FileName :3 - Securing AWS Root User Account.mp4 | Size: (23.79 MB)
FileName :4 - IAM Users, Groups & Policies.mp4 | Size: (27.03 MB)
FileName :5 - Secure Access from CICD Pipeline to AWS.mp4 | Size: (46.81 MB)
FileName :6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4 | Size: (18.16 MB)
FileName :7 - Overview of IAM Resources & Secure Access Management in AWS.mp4 | Size: (9.18 MB)
FileName :1 - Security Essentials for Accessing Deployment Server.mp4 | Size: (27.93 MB)
FileName :2 - Configure AWS Systems Manager for EC2 Server.mp4 | Size: (41.49 MB)
FileName :3 - AWS SSM Commands in Release Pipeline for Server Access.mp4 | Size: (46.16 MB)
FileName :4 - Secure Continuous Deployment to Server using SSM.mp4 | Size: (65.44 MB)
FileName :5 - Secure Access to AWS with IAM Roles & Short-Lived Credentials.mp4 | Size: (57.85 MB)
FileName :6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4 | Size: (10.37 MB)
FileName :7 - Understand Dynamic Application Security Testing (DAST).mp4 | Size: (31.16 MB)
FileName :8 - Configure Automated DAST Scans in CICD Pipeline.mp4 | Size: (72.8 MB)
FileName :9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4 | Size: (7.4 MB)
FileName :12 1-Kubernetes-Security-Overview.mp4 | Size: (24.29 MB)
FileName :12 2-Kubernetes-Security-Best-Practices.mp4 | Size: (93.25 MB)
FileName :12 3-Provision-AWS-EKS-Cluster.mp4 | Size: (83.7 MB)
FileName :13 1-Chapter-Introduction.mp4 | Size: (8.13 MB)
FileName :13 2-Role-Based-Access-Control- RBAC.mp4 | Size: (59.99 MB)
FileName :13 3-IAM-Roles-and-K8s-Roles-How-it-works.mp4 | Size: (37.65 MB)
FileName :13 4-Configure-IAM-Roles-and-link-to-K8s-Roles-in-IaC.mp4 | Size: (60.21 MB)
FileName :13 5-Configure-K8s-Role-and-ClusterRole-in-IaC.mp4 | Size: (100.39 MB)
FileName :13 6-Review-and-Test-Access.mp4 | Size: (89.53 MB)
FileName :13 7-Summary- -Wrap-Up.mp4 | Size: (14.76 MB)
FileName :14 1-Using-GitLab-OIDC-in-AWS.mp4 | Size: (38.1 MB)
FileName :14 2-Configure-Authentication-with-GitLab-Identity-Provider.mp4 | Size: (43.15 MB)
FileName :14 3-Pipeline-Configuration-for-establishing-a-secure-connection.mp4 | Size: (81.66 MB)
FileName :14 4-Terraform-Configuration-for-EKS-provisioning.mp4 | Size: (105.72 MB)
FileName :14 5-Summary- -Wrap-Up.mp4 | Size: (19.45 MB)
FileName :15 1-Introduction-to-EKS-Blueprints.mp4 | Size: (15.83 MB)
FileName :15 2-Overview-of-EKS-Add-ons-we-install.mp4 | Size: (36.14 MB)
FileName :15 3-Configure-EKS-Add-ons.mp4 | Size: (70.4 MB)
FileName :15 4-Troubleshooting- -Tuning-Autoscaler.mp4 | Size: (68.48 MB)
FileName :15 5-Access-Token-Expiration.mp4 | Size: (6.13 MB)
FileName :16 1-Chapter-Overview.mp4 | Size: (8.79 MB)
FileName :16 2-ArgoCD-explained- Part-1 -What -Why-and-How.mp4 | Size: (29.92 MB)
FileName :16 3-ArgoCD-explained- Part-2 -Benefits-and-Configuration.mp4 | Size: (66.55 MB)
FileName :16 4-Overview-of-CI-or-CD-Pipelines-to-Git-repositories.mp4 | Size: (27.34 MB)
FileName :16 5-Configure-ArgoCD-in-IaC- Deploy-Argo-Part-1.mp4 | Size: (81.32 MB)
FileName :16 6-IaC-Pipeline-Configuration- Deploy-Argo-Part-2.mp4 | Size: (44.5 MB)
FileName :16 7-Deployment-through-Pipeline-and-Access-Argo-UI- Deploy-Argo-Part-3.mp4 | Size: (51.84 MB)
FileName :16 8-K8s-Manifests-for-Microservices-App-using-Kustomize.mp4 | Size: (75.07 MB)
FileName :16 9-Create-GitOps-Pipeline-to-update-Kustomization-File.mp4 | Size: (76.97 MB)
FileName :16 10-Create-CI-Pipeline-that-triggers-GitOps-Pipeline.mp4 | Size: (29.62 MB)
FileName :16 11-See-Whole-Automated-Workflow-in-Action.mp4 | Size: (31.85 MB)
FileName :17 1-Why-Policy-as-Code.mp4 | Size: (12.27 MB)
FileName :17 2-Introduction-to-Open-Policy-Agent- OPA -and-OPA-Gatekeeper.mp4 | Size: (29.85 MB)
FileName :17 3-How-Gatekeeper-and-OPA-works.mp4 | Size: (26.17 MB)
FileName :17 4-Install-OPA-Gatekeeper-in-Cluster.mp4 | Size: (29.9 MB)
FileName :17 5-Defining-Policies.mp4 | Size: (31.14 MB)
FileName :17 6-Define-Policy-to-reject-NodePort-Service.mp4 | Size: (108.4 MB)
FileName :17 7-Define-Policy-to-reject-Privileged-Containers.mp4 | Size: (62.91 MB)
FileName :17 8-Summary.mp4 | Size: (7.71 MB)
FileName :18 1-Why-Secrets-Manager-are-needed.mp4 | Size: (30.32 MB)
FileName :18 2-Introduction-to-External-Secrets-Operator-in-K8s.mp4 | Size: (10.56 MB)
FileName :18 3-Capabilities-of-Secrets-Management-Tools.mp4 | Size: (9.72 MB)
FileName :18 4-Vault-Capabilities- Vault-Deep-Dive-Part-1.mp4 | Size: (20.5 MB)
FileName :18 5-How-Vault-works- Vault-Deep-Dive-Part-2.mp4 | Size: (34.63 MB)
FileName :18 6-Introduction-to-AWS-Secrets-Manager.mp4 | Size: (13.14 MB)
FileName :18 7-Deploy-External-Secrets-Controller- Demo-Part-1.mp4 | Size: (45.45 MB)
FileName :18 8-Create-SecretStore-and-ExternalSecret.mp4 | Size: (61.43 MB)
FileName :18 9-Use-Secret-in-Microservice- Demo-Part-3.mp4 | Size: (17.38 MB)
FileName :19 1-Chapter-and-Demo-Overview.mp4 | Size: (5.69 MB)
FileName :19 2-Service-Mesh-and-Istio-What -Why-and-How.mp4 | Size: (52.27 MB)
FileName :19 3-Install-Istio-in-K8s-cluster.mp4 | Size: (91.55 MB)
FileName :19 4-Configure-Traffic-Routing.mp4 | Size: (86.77 MB)
FileName :19 5-Configure-a-Secure-Gateway.mp4 | Size: (57.8 MB)
FileName :19 6-mTLS-Deep-Dive.mp4 | Size: (76.24 MB)
FileName :19 7-Authorization-in-Istio-Deep-Dive.mp4 | Size: (47.19 MB)
FileName :19 8-Istio-Policies-vs-K8s-Network-Policies.mp4 | Size: (17.54 MB)
FileName :19 9-Configure-Authorization-Policies.mp4 | Size: (75.86 MB)
FileName :19 10-Wrap-Up.mp4 | Size: (5.09 MB)
FileName :20 1-What-is-Compliance.mp4 | Size: (13.33 MB)
FileName :20 2-What-are-CIS-Benchmarks.mp4 | Size: (41.62 MB)
FileName :20 3-Why-Compliance-as-Code.mp4 | Size: (8.13 MB)
FileName :20 4-Demo-Overview-and-Introduction-to-AWS-Config.mp4 | Size: (44.58 MB)
FileName :20 5-Setting-up-AWS-Config-Rules.mp4 | Size: (49.43 MB)
FileName :20 6-Configure-Auto-Remediation-for-Insecure-Security-Groups-for-EC2-Instances.mp4 | Size: (63.94 MB)
FileName :20 7-Configure-Auto-Remediation-for-CloudTrail-Logging -if-switched-off.mp4 | Size: (27.46 MB)
FileName :20 8-Configure-Compliance-Rules-for-AWS-EKS-Service.mp4 | Size: (41.75 MB)
FileName :20 9-Wrap-Up.mp4 | Size: (5.93 MB)
FileName :21 1-Why-DevSecOps-is-Important.mp4 | Size: (96.08 MB)
FileName :21 2-Driving-Cultural-Change-Real-World-Examples-of-Companies.mp4 | Size: (232.31 MB)
FileName :21 3-How-to-start-implementing-DevSecOps-in-Organizations- Practical-Tips.mp4 | Size: (402.59 MB)
FileName :21 4-Final-Summary -The-DevSecOps-Transformation.mp4 | Size: (228.03 MB)
FileName :22 -Apply-for-the-Certified-DevSecOps-Practitioner-credential- Digital-Badge.mp4 | Size: (57.6 MB)]
Screenshot
![[Image: ZhN3Cx0H_o.jpg]](https://images2.imgbox.com/3a/ba/ZhN3Cx0H_o.jpg)
![[Image: signature.png]](https://softwarez.info/images/avsg/signature.png)




