Mastering DevSecOps

$17.00
Compare

amazon paymentsamerican expressapple paybitcoindankortdiners clubdiscoverdogecoindwollaforbrugsforeningeninteracgoogle payjcbklarnaklarna-pay-laterlitecoinmaestromasterpaypalshopify paysofortvisa
SKU:
Availability : In Stock Pre order Out of stock
Description

Fusing Security into the Heart of Development and Operations!

In the fast-paced world of software development, delivering applications swiftly and securely is paramount. The integration of security practices into the DevOps process has given rise to DevSecOps – a transformative approach that harmonizes development, operations, and security to achieve continuous delivery with uncompromising security measures.

"Mastering DevSecOps" is your ultimate guide to understanding and implementing this game-changing methodology. Authored by leading experts in the field, this comprehensive book equips developers, operations teams, and security professionals with the knowledge and tools to embrace DevSecOps and build a secure and agile software development pipeline.

What's Inside:

  1. Understanding DevSecOps
    1. The Evolution of Software Development
    2. Introducing DevSecOps
    3. Key Principles of DevSecOps
    4. Benefits of Implementing DevSecOps
    5. Challenges and Misconceptions
  2. Agile Development and DevSecOps
    1. Agile Methodology Overview
    2. Integrating Security into Agile Practices
    3. Agile Tools and Techniques for DevSecOps
  3. Continuous Integration and Continuous Deployment
    1. Introduction to CI/CD
    2. Building Secure CI/CD Pipelines
    3. Automated Testing and Quality Assurance
    4. Version Control and Release Management
  4. Infrastructure as Code (IaC)
    1. Understanding Infrastructure as Code
    2. Security Considerations for IaC
    3. Implementing Secure Infrastructure Pipelines
    4. Cloud Security and IaC
  5. Security Testing in DevSecOps
    1. Types of Security Testing
    2. Static Application Security Testing (SAST)
    3. Dynamic Application Security Testing (DAST)
    4. Interactive Application Security Testing (IAST)
    5. Implementing Security Testing in CI/CD Pipelines
  6. Threat Modeling and Risk Assessment
    1. Understanding Threat Modeling
    2. Conducting Risk Assessments
    3. Integrating Threat Modeling into DevSecOps
  7. Secure Coding Practices
    1. The Importance of Secure Coding
    2. Common Security Vulnerabilities
    3. Secure Coding Techniques and Best Practices
    4. Code Reviews and Security Audits
  8. Identity and Access Management (IAM)
    1. IAM Fundamentals
    2. Implementing Secure Authentication and Authorization
    3. Role-Based Access Control (RBAC)
    4. Identity Federation and Single Sign-On (SSO)
  9. Secure Deployment and Configuration Management
    1. Secure Deployment Strategies
    2. Container Security and Orchestration
    3. Configuration Management Best Practices
    4. Secrets Management
  10. Incident Response and Forensics
    1. Preparing for Incidents
    2. Incident Detection and Response
    3. Conducting Forensic Investigations
    4. Learning from Incidents and Building Resilience
  11. DevSecOps Culture and Mindset
    1. Building a DevSecOps Culture
    2. Shifting Left and Collaboration
    3. Breaking Down Silos
    4. Continuous Learning and Improvement
  12. Security Champions and Developer Enablement
    1. Empowering Security Champions
    2. Developer Enablement Programs
    3. Training and Education for DevSecOps
  13. Compliance and Governance in DevSecOps
    1. Regulatory Compliance and DevSecOps
    2. DevSecOps Governance Frameworks
    3. Auditing and Compliance Automation
    4. Balancing Security and Compliance with Agility
  14. Metrics and Measurement
    1. Key Metrics for DevSecOps
    2. Measuring Security Posture
    3. Security Analytics and Visualization
    4. Continuous Improvement through Metrics
  15. DevSecOps in Large-Scale Enterprises
    1. Challenges in Scaling DevSecOps
    2. Building a Secure DevOps Ecosystem
    3. Case Studies and Best Practices
  16. Appendix
    1. Tools and Technologies for DevSecOps
    2. Additional Resources
    3. Glossary
    4. About the author


About the author:

Cybellium is dedicated to empowering individuals and organizations with the knowledge and skills they need to navigate the ever-evolving computer science landscape securely and learn only the latest information available on any subject in the category of computer science including:

- Information Technology (IT)

- Cyber Security

- Information Security

- Big Data

- Artificial Intelligence (AI)

- Engineering

- Robotics

- Standards and compliance


Our mission is to be at the forefront of computer science education, offering a wide and comprehensive range of resources, including books, courses, classes and training programs, tailored to meet the diverse needs of any subject in computer science.

Buy Now: Available in Hardcover, Paperback, and eBook formats.