Course Overview

Popular data breaches and service outages are showing us that security cannot be a one-off time job, negligible, and can be executed only at the end of the final stages of application development. Otherwise, it is not only affecting company reputations but also customer loyalty to the delivered product and services.

If Security is implemented and limited at the final stages, then prevention or recovery is also taking much more time&money for spotting the correct point and figuring out the correct solution. This can be avoidable by changing application development pipelines by introducing the correct tools and techniques in the right places. We can detect most of the security issues earlier than before delivering applications/services to the customers with the “Shifting Security Left” strategy.

So, this course will give you the theory and practical knowledge to automate and embed your security requirements into Continuous Integration (CI)/Continuous Delivery (CD) Pipelines using open source/vendor tools and the latest techniques. You will secure your Software Development Life Cycle (SDLC) and start your Secure SDLC journey, then position Security in your organization not only as a one-off task but as a continuous process. And you will step into the DevSecOps world.

What You Will Learn

  • Understand what DevOps and DevSecOps is
  • Identify what are the benefits of security automation in the CI/CD Pipelines
  • Spot points where you can codify and embed security in the CI/CD Pipelines
  • Step into container world and understand how the puzzle pieces are fitting each other
  • Learn Jenkins in and out
  • Secure Jenkins itself

Program Curriculum

  • The DevOps Concept
  • Continuous Integration (CI)
  • Continuous Delivery (CD)
  • Continuous Deployment
  • Security challenges in the traditional CI/CD Pipelines
  • Shift Left Paradigm
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • The DevSecOps Concept
  • The DevSecOps Manifesto
  • Which problems can be resolved with DevSecOps approach?
  • Placing/Positioning Security in the CI/CD Pipelines Phases
  • Adopting an Approach with Maturity Models
  • Tooling selection and Implementation Strategy
  • Chapter 2 Quiz

  • An Overview of Containerization History
  • Introduction to Docker and its Architecture
  • Docker Containers and its Management
  • Docker Images, Image Registry and its Management
  • An Overview on Container Orchestration
  • Chapter 3 Quiz

  • An Overview on Jenkins
  • An Overview on Jenkins
  • Jenkins Standalone Installation on Linux/Windows and as Container
  • Jenkins Configuration (General Config and Plugins)
  • Jenkins Worker (Slave) Configuration
  • Creating and Managing Views, Jobs
  • Jenkins Administration (Backup, Restore, Upgrade)
  • Chapter 4 Quiz

  • An Overview of Securing Jenkins Itself
  • Access, Authorization, Accounting
  • Jenkins Main and Workers Hardening
  • Update OS, Jenkins Main, and Workers
  • Securing Jenkins Pipeline
  • Jenkins Config and Job Backups
  • Chapter 7 Quiz
Load more modules

Instructor

Burak Cansizoglu

Burak is working as a Cloud/DevOps freelance consultant. He has Computer Engineering Bachelor and Engineering Management master’s degrees. He performed different roles during his professional career track. As an IT professional and consultant, he has more than 13 years of experience in the finance, telecommunication, and government sectors. He likes to learn new technologies and wants to share his knowledge, experiences with the community. He likes all lean, agile initiatives. And he believes that the DevOps mindset and Dev-X-Ops transformation will bring more agility to the Enterprises as well as employees.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $69.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 699.00
Billed annually or $79.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8