part 2/17.3-How-Gatekeeper-and-OPA-works.mp4 26.2 MB
part 1/10 - IaC and GitOps for DevSecOps/1 - Understand Impact of IaC in Security & DevSecOps (10 - IaC and GitOps for DevSecOps).mp4 25.6 MB
part 1/10 - IaC and GitOps for DevSecOps/3 - Replace Manually Created Infrastructure with Automatically Provisioned Resources.mp4 25.0 MB
part 2/12.1-Kubernetes-Security-Overview.mp4 24.3 MB
part 1/8 - AWS Cloud Security & Access Management/3 - Securing AWS Root User Account.mp4 23.8 MB
part 1/11 - Logging & Monitoring for Security/8 - Configure AWS Budgets for Monthly Usage Costs.mp4 22.5 MB
part 2/18.4-Vault-Capabilities-_Vault-Deep-Dive-Part-1_.mp4 20.5 MB
part 2/14.5-Summary-_-Wrap-Up.mp4 19.5 MB
part 1/8 - AWS Cloud Security & Access Management/6 - Understand Importance of IAM Roles in AWS Cloud Security.mp4 18.2 MB
part 2/19.8-Istio-Policies-vs-K8s-Network-Policies.mp4 17.5 MB
part 2/18.9-Use-Secret-in-Microservice-_Demo-Part-3_.mp4 17.4 MB
part 2/15.1-Introduction-to-EKS-Blueprints.mp4 15.8 MB
part 1/11 - Logging & Monitoring for Security/2 - Introduction to CloudTrail and CloudWatch.mp4 15.0 MB
part 1/11 - Logging & Monitoring for Security/1 - Understand Need for Logging and Monitoring in Security (11 - Logging & Monitoring for Security).mp4 14.8 MB
part 2/13.7-Summary-_-Wrap-Up.mp4 14.8 MB
part 2/20.1-What-is-Compliance.mp4 13.3 MB
part 2/18.6-Introduction-to-AWS-Secrets-Manager.mp4 13.1 MB
part 1/1 - Security Essentials/3 - How to Secure Systems Against Attacks.mp4 12.8 MB
part 2/17.1-Why-Policy-as-Code.mp4 12.3 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/2 - Pre-Requisites of Bootcamp.mp4 11.3 MB
part 2/16 - App Release Pipeline with ArgoCD.pdf 11.0 MB
part 1/10 - IaC and GitOps for DevSecOps/7 - Understand IaC Concept Cattle vs Pets.mp4 10.8 MB
part 2/18.2-Introduction-to-External-Secrets-Operator-in-K8s.mp4 10.6 MB
part 1/9 - Secure Continuous Deployment & DAST/6 - Overview of AWS Security Measures and Continuous Security Improvements.mp4 10.4 MB
part 1/3 - Application Vulnerability Scanning/2 - Impact of Missing Security Insights.mp4 10.0 MB
part 2/15 - EKS Blueprints.pdf 9.9 MB
part 1/01 - Security Essentials.pdf 9.8 MB
part 2/18.3-Capabilities-of-Secrets-Management-Tools.mp4 9.7 MB
part 2/18 - Secrets Management.pdf 9.4 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/1 - Why learn DevSecOps.mp4 9.3 MB
part 1/8 - AWS Cloud Security & Access Management/7 - Overview of IAM Resources & Secure Access Management in AWS.mp4 9.2 MB
part 1/02 - Intro to DevSecOps.pdf 9.0 MB
part 2/13 - Kubernetes Access Management.pdf 8.8 MB
part 2/16.1-Chapter-Overview.mp4 8.8 MB
part 2/20.3-Why-Compliance-as-Code.mp4 8.1 MB
part 2/13.1-Chapter-Introduction.mp4 8.1 MB
part 1/6 - Build a CD Pipeline/1 - Overview of a CICD Pipeline (6 - Build a CD Pipeline).mp4 8.1 MB
part 2/19 - Service Mesh with Istio.pdf 7.9 MB
part 2/17.8-Summary.mp4 7.7 MB
part 2/14 - Secure IaC Pipeline for EKS Provisioning.pdf 7.6 MB
part 1/11 - Logging & Monitoring for Security.pdf 7.5 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/4 - Support and Other Bootcamp Materials.mp4 7.5 MB
part 1/9 - Secure Continuous Deployment & DAST/9 - Overview of Complete DevSecOps Pipeline with Static and Dynamic Security Scans.mp4 7.4 MB
part 1/8 - AWS Cloud Security & Access Management/2 - Understand AWS Access Management using IAM Service.mp4 7.2 MB
part 1/07 - Image Scanning.pdf 7.2 MB
part 1/09 - Secure Continuous Deployment & DAST.pdf 7.2 MB
part 1/10 - IaC and GitOps for DevSecOps.pdf 7.2 MB
part 1/03 - App Vulnerability Scanning.pdf 6.8 MB
part 2/20 - Compliance as Code.pdf 6.7 MB
part 2/17 - Policy as Code.pdf 6.6 MB
part 1/0 - Getting Started with the DevSecOps Bootcamp/5 - Certified DevSecOps Practitioner - Applying for Digital Badge.mp4 6.3 MB
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.