Useful Links
Computer Science
DevOps and SRE
Continuous Integration and Continuous Delivery (CI/CD)
1. Introduction to CI/CD
2. Foundations of Version Control
3. Continuous Integration Principles and Practices
4. CI/CD Pipeline Architecture
5. Automated Testing in CI/CD
6. Continuous Delivery and Deployment
7. Infrastructure and Tooling
8. Security in CI/CD (DevSecOps)
9. Monitoring and Observability
10. Database CI/CD
11. Advanced CI/CD Practices
12. Troubleshooting and Problem Resolution
13. Organizational Adoption and Change Management
14. Future Trends and Emerging Practices
Security in CI/CD (DevSecOps)
DevSecOps Principles
Shifting Security Left
Integrating Security Early
Developer Security Training
Security as Code
Security Automation
Automated Security Testing
Security Policy Enforcement
Compliance Automation
Continuous Security Monitoring
Runtime Security
Threat Detection
Incident Response
Security Testing in Pipelines
Static Application Security Testing
Source Code Scanning
Integration with CI/CD
SAST Tools and Configuration
Dynamic Application Security Testing
Runtime Vulnerability Detection
DAST Tools and Integration
API Security Testing
Software Composition Analysis
Dependency Vulnerability Scanning
License Compliance
Supply Chain Security
Infrastructure Security Testing
Infrastructure as Code Scanning
Container Image Scanning
Cloud Configuration Assessment
Secret Management
Secret Management Principles
Least Privilege Access
Secret Rotation
Audit and Compliance
Secret Storage Solutions
HashiCorp Vault
AWS Secrets Manager
Azure Key Vault
Kubernetes Secrets
Secret Management in Pipelines
Secure Secret Injection
Environment-Specific Secrets
Secret Scanning in Code
Pipeline Security
Pipeline Access Control
Authentication and Authorization
Role-Based Access Control
Audit Logging
Secure Pipeline Configuration
Pipeline Hardening
Resource Isolation
Network Security
Supply Chain Security
Dependency Management
Build Environment Security
Artifact Integrity
Previous
7. Infrastructure and Tooling
Go to top
Next
9. Monitoring and Observability