Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Ultimate DevSecOps Course - With Real Life Scenarios
Training Overview
Description of Training
Video Overview (2:24)
Section 1: Promotional Video
1. Promotional Video (2:24)
Section 2: Introduction
2. Course OutLine
3. What Is DevOps Vs DevSecOps (0:38)
4. Red Hat. What is DevSecOps?
5. Wikipedia. DevOps
6. Atlassian. DevOps: Breaking the Development-Operations barrier
Section 3: Linux/Unix For DevOps and Developers
7. Linux Section Outline
8. Introduction Lectures
9. History of Unix
10. Linux vs Unix (3:00)
11. Then What is GNU Linux
12. What is Linux Distributions
13. Unix Architecture (4:15)
14. Linux Fundamentals Lectures
15. IMPORTANT NOTE !
16. Linux Directory Structure Theory
17. The Shell Theory
18. Basic Linux Commands Theory
19. Linux Basics Commands (5:29)
20. Working with Directories Theory
21. Linux Directories (17:06)
22. Listing Files and Understanding ls Output Theory
23. list Output (6:08)
24. Links and Shortcuts in Linux Theory
25. Links Soft Hard (13:32)
26. File and Directory Permissions Theory
27. Linux Permission (31:49)
28. Finding Files and Directories Theory
29. Linux find (7:36)
30. Viewing Files and the Nano Editor Theory
31. Linux View Files Nano (5:06)
32. Editing Files in Vi/Vim Theory
33. Linux vim (11:19)
34. Linux copy move (2:26)
35. Intermediate Linux Skills
36. Input Output and Redirection Theory
37. Linux redirection logo (4:01)
38. Linux Comparing Files (3:59)
40. Linux Transfer Files Over Network (7:16)
41. Shell Aliases Theory
42. Linux alias (7:53)
43. Linux Env VAR (4:42)
44. Processes and Job Control Theory
45. Linux Processes Jobs (9:46)
46. Scheduling Repeated Jobs with Cron Theory
47. Linux CronJobs (5:00)
48. Linux History (3:02)
49. Linux Sudo Another Users (11:29)
50. Linux Users Management (13:55)
51. The Linux Boot Process
52. Linux File system (8:46)
53. What is Shell Scripting
54. Linux Var special (6:52)
55. Linux operators (1:41)
56. Linux if else Case (4:37)
57. Linux Loops (3:18)
58. Linux functions (0:43)
Section 4: Python For Ethical Hackers
59. IMPORTANT NOTE !!!
60. Section Outline
61. What Is Ethical Hacking ?
62. What is Python and why to use it in Security
63. Setup and Install Python (6:50)
64. Our First Hello World Program (2:14)
65. Python Data Types (2:10)
66. Numbers (4:00)
67. Math Functions (2:11)
68. Operator Precedence (1:33)
69. Variables (2:37)
70. Strings (4:12)
71. String Concatenation (0:55)
72. Type Conversion (3:51)
73. Escape Sequences (3:23)
74. Formatted Strings (4:49)
75. String Indexes (2:59)
76. Booleans (2:39)
77. Lists (3:29)
78. List Methods (2:58)
79. Matrix (4:05)
80. None (0:58)
81. Dictionaries (4:09)
82. Dictionary Methods (1:25)
83. Tuples (1:43)
84. Conditional (If .. If else ... if elif else) (7:24)
85. For Loops (1:14)
86. range() (1:04)
87. While Loops (1:59)
88. break, continue, pass (6:10)
89. Functions (6:16)
90. *args and **kwargs (3:19)
91. Packages and Import in Python (8:52)
92. Error Handling In Python (5:47)
93. Python File I/O (9:24)
94. Python File I/O Errors Handling (4:21)
95. Python Coding Project #1 - Portscanner [Section]
96. What is Port Scanner and how it works
97. IMPORTANT NOTE !!!
98. Building Our Own First Port Scanner (20:13)
99. Python Coding Project #2 - Wep App Directory Discovery [Section]
100. Make Our Own First Directory Discovery In Python (10:51)
101. Python Coding Project #3 - Web App Login Brute-Force [Section]
102. What is Brute Force Attack
103. Types of Brute Force Attacks
104. IMPORTANT NOTE !!!
105. Make Our Own First Brute Forcer In Python (15:59)
Section 5: AWS (Amazon Web Services) For DevOps
106. What is AWS and Why to Choose it Over Others Providers? (10:28)
107. AWS EC2 Overview (10:28)
108. EC2 - Create Your First EC2 Instance and Connect to it (4:03)
109. EC2 - Hands On more Options (12:37)
110. EC2 - AMI (Amazon Machine Images) - Hands On (8:24)
111. EC2 - EBS (Elastic Block Storage) - Hands On (9:21)
112. EC2 - EBS Snapshots and Data Lifecycle Manager - Automation (4:45)
113. EC2 - Placement Groups (4:17)
114. EC2 - Key Pairs (1:14)
115. EC2 - Network Interfaces (5:13)
116. AWS ASG Overview (1:04)
117. ASG - Launch Configurations (3:57)
118. ASG - Auto Scaling Groups (8:01)
119. AWS ELB Overview (3:09)
120. ELB - Classic Load Balancers (4:42)
121. ELB - Target Groups (2:42)
122. ELB - Network Load Balancers (3:15)
123. ELB - Application Load Balancers (4:25)
124. AWS S3 Overview (5:32)
125. S3 - Create Your First S3 Bucket , Upload and Download (2:47)
126. S3 - Versioning (3:50)
127. S3 - Server Access Logging (1:52)
129. S3 - Bucket Permissions (11:26)
130. S3 - Bucket Encryption (1:42)
131. S3 - Bucket Events (2:59)
132. S3 - Bucket Management (Lifecycle , Replication ,Analytics Metrics , Inventory) (10:14)
133. S3 - Static Website Hosting (7:09)
134. AWS CloudFront - Implement it with your Static Website (14:37)
135. AWS VPC Overview (3:34)
136. VPC - Create Your First VPC (5:54)
137. VPC - Subnets (16:34)
138. VPC - Elastic IPs (5:07)
139. VPC - Route Tables (5:37)
140. VPC - Internet Gateways (3:21)
141. VPC - NAT Gateways (7:52)
142. VPC - Egress Only Internet Gateways (1:28)
143. VPC - Network ACLs (4:54)
144. VPC - Security Groups (8:20)
145. VPC - Peering Connections (5:07)
146. AWS IAM Overview (1:19)
147. IAM - Users (4:09)
148. IAM - Groups (2:01)
149. IAM - Roles (3:22)
150. IAM - Custom Policies (2:24)
151. AWS Route53 Overview (2:20)
152. Route53 - Register your Own Domains (2:44)
153. Route53 - Hosted Zones (6:45)
154. Route53 - Health Checks (3:24)
Section 6: Jenkins CI/CD
155. What is CI/CD and Continuous Delivery Vs Continuous Deployment (3:02)
156. What is Jenkins and Why to use it (1:40)
157. Setup Jenkins and use it on Linux (7:07)
158. Creating Jenkins Job (5:47)
159. Jenkins Job Configuration - General (11:47)
160. Jenkins Job Configuration - Source Code Management (4:48)
161. Jenkins Job Configuration - Build Triggers (10:09)
162. Jenkins Job Configuration - Build Environment (3:17)
163. Jenkins Job Configuration - Build (2:56)
164. Jenkins Job Configuration - Post-build Actions (1:38)
165. Multiple Jenkins Jobs - Jenkins Views (1:50)
166. Jenkins System Information (1:34)
167. Jenkins System Logs (1:08)
168. Global Tool Configuration (1:41)
169. Configure System (9:54)
170. Manage Plugins (3:49)
171. Manage Users (2:15)
172. Jenkins Global Security (7:08)
173. Jenkins Credentials (3:19)
174. Jenkins Nodes (20:07)
Section 7: Containerization Technology - Docker
175. What is Docker and Why to Use it ? (5:51)
176. How Docker Works - (Docker Architecture) (6:33)
177. Virtual Machines Vs Containers (6:58)
178. Install and Setup Docker on Linux (7:14)
179. Install and Setup Docker on Mac (3:02)
180. Docker Basics Overview (1:08)
181. Docker Engine (Client CLI Vs API Vs Daemon) (4:11)
182. Docker Images (4:01)
183. Docker Containers (3:58)
184. Docker Storage (5:28)
185. Docker Networking (3:46)
186. Docker Commands Overview (2:23)
187. What is Dockerfile (3:42)
188. What is Docker Compose (3:20)
189. Running hello-world Container (6:36)
190. Running Ubuntu Container (11:16)
191. Docker Containers Management (9:50)
192. Docker Images Management (4:50)
193. Running Nginx Container With Exposed Port (7:35)
194. Running Nginx Container With Custom Web Pages (8:42)
195. Dockerfile Hands-On Lab Part 1 (20:34)
196. Dockerfile Hands-On Lab Part 2 (6:44)
197. Docker Compose Introduction (1:42)
198. YAML Syntax (7:06)
199. Creating the Python app.py (FLASK) (4:36)
200. Creating the Dockerfile (7:18)
201. Creating the docker-compose.yml (3:36)
202. Building and Running the app with Compose (5:54)
203. Adding bind mount to the Compose file then Re-building and Running (2:43)
204. More docker-compose commands (3:37)
Section 8: IAC (Infrastructure As Code) - AWS CloudFormation
205. What is IAC (Infrastructure As Code) (3:14)
206. AWS CloudFormation Overview (7:11)
208. YAML Syntax Quick View (4:52)
209. CloudFormation Create Stack Hands On (10:02)
210. CloudFormation Update and Delete Stack (12:56)
211. CloudFormation Parameters (6:22)
212. CloudFormation Resources (3:34)
213. CloudFormation Mappings (5:02)
214. CloudFormation Outputs (4:43)
215. CloudFormation Conditions (5:27)
216. CloudFormation Intrinsic Functions (1:10)
217. CloudFormation User Data (6:17)
218. CloudFormation cfn-init (8:19)
219. CloudFormation cfn-signal and wait conditions (5:04)
220. CloudFormation Rollbacks (1:16)
221. CloudFormation Nested Stacks (7:17)
222. CloudFormation ChangeSets (5:52)
223. CloudFormation - DependsOn (2:19)
224. CloudFormation - Drift Detection (4:27)
Section 10: Continuous Monitoring - AWS CloudWatch
278. AWS CloudWatch Overview (7:27)
279. CloudWatch Metrics - Default Metrics (10:34)
280. CloudWatch Metrics - Custom Metrics (9:42)
281. CloudWatch Alarms - Overview (10:59)
282. CloudWatch Alarms - Billing Alarms (4:15)
283. CloudWatch Logs - Overview (5:00)
284. CloudWatch Logs - Custom Logs (Unified CloudWatch Agent) (12:24)
285. CloudWatch Logs - Metric Filters & Alarms (5:30)
286. CloudWatch Events (7:46)
287. CloudWatch Dashboards (4:00)
Section 12: Soft Skills for DevOps
303. What Are Soft Skills? (1:12)
304. The Difference Between Hard Skills vs Soft Skills (2:08)
305. Why We Need Soft Skills and The 10 Most Important Soft Skills List & Examples (1:08)
306. Communication (0:34)
307. Teamwork (0:41)
308. Adaptability (0:41)
309. Problem-Solving (0:36)
310. Creativity (0:32)
311. Work Ethic (0:35)
312. Interpersonal Skills (0:28)
313. Time Management (0:31)
314. Leadership (0:34)
315. Attention to Details (0:29)
Section 13: Real Life Vol 1 - Jenkins , Github and AWS In Practice
316. The Diagram - What we will build ? (1:03)
317. Creating VPC and the Subnets - Public and Private (3:04)
318. Creating IGW and NAT and modify the Subnets with the Route Tables (7:56)
319. Installing The Pritunl VPN (Bastion host) (13:25)
320. Setup The VPN Connection (10:30)
321. Installing and Setup Jenkins (11:43)
322. Enhance Jenkins URL (17:42)
323. Integrate Jenkins With Github Part 1 (13:02)
324. Integrate Jenkins With Github Part 2 (13:37)
176. How Docker Works - (Docker Architecture)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock