A practical training that covers all the basics you need. It covers
microservices (React, JAVA and Python),
building and running them on cloud VMs,
containerizing and deploying them using Docker,
Running and Orchestrating them on Kubernetes etc !
Discover why security is crucial in modern development and learn how to identify potential security risks and their solutions. Our expert instructors will guide you through the process of working with the security team and show you how to implement DevSecOps best practices. You'll also learn about Helm, Kubernetes Package Manager, Helm Charts, and Code Linting.
In this session, we'll take a deep dive into securing your code and dependencies. You'll learn how to install Sonarqube and Helm, and use them to detect and eliminate vulnerabilities. We'll show you how to create projects, generate tokens, and run scanners to check for security threats. You'll also learn about application dependency security and how to detect known vulnerabilities.
Don't let vulnerabilities in your application dependencies and OS packages compromise your security. Learn how to identify these vulnerabilities using build tools such as NPM and Maven. Our experts will guide you through the process of examining reports and guidelines to ensure that your projects are secure.
Containers and operating systems add an extra layer of security threat, which is why it's important to check and find out the threats while developing a container. Our experts will teach you about container development security and best practices for running a binary. You'll learn how to minimize the number of packages and use lightweight base images such as Alpine and Distroless images from Google.
Learn how to use the right base image and find CVEs of your containerized applications. Our experts will teach you about multi-stage building and how to reduce the attack surface of your containers. You'll also learn how to use Trivy for container security and scan an image using Trivy.
Configuration changes can be a challenge, but they don't have to compromise your security. In this session, our experts will show you how to ensure security at configuration, whether it's Kubernetes, Terraform, or Dockerfile. You'll learn about loopholes in Docker and Kubernetes and how to solve them using Trivy.
Learn how to prevent man-in-the-middle attacks by securing your supply chain. Our experts will teach you about Terraform configurations security and the potential risks involved. You'll also learn about identifying supply chains in CI/CD pipelines and how to use hash values and digital signatures to detect file modifications.
Our final session is all about implementing supply chain security in an automated way and shifting it to left. You'll learn about Cosign for supply chain security of container images and how to use it to secure your projects.
Join us for an exciting journey into the world of DevSecOps and take your security skills to the next level!
Any insecure and unreliable applications and configurations should be prevented from entering to your production infrastructure. Use policies to ensure that your infrastructure decline non-secure requests from people and systems.
Security is no longer a trouble once it's well integrated with your CI/CD systems. Let's build a CI/CD system for your projects with security in the right space. :)
Now you are done with the course and its time to start the most amazing part of this course. 20+ engineers working together to implement best container practics on a project, to make you ready for your Job search. The project is too big and wide that if one person handle it in a company, its takes 3 to 4 months. You will also go through an interview and resume preparation session at the end to kickstart your Job hunt!