Useful Links
Computer Science
DevOps and SRE
DevOps
1. Introduction to DevOps
2. DevOps Culture and Organizational Change
3. Foundational Frameworks and Methodologies
4. Version Control and Source Code Management
5. Continuous Integration
6. Continuous Delivery and Deployment
7. Infrastructure as Code
8. Containerization
9. Container Orchestration
10. Monitoring and Observability
11. Cloud Computing and DevOps
12. Security in DevOps (DevSecOps)
13. Advanced DevOps Practices
14. DevOps Metrics and Measurement
15. DevOps Transformation and Adoption
Security in DevOps (DevSecOps)
DevSecOps Fundamentals
Shift-Left Security
Early Security Integration
Security by Design
Continuous Security Testing
Security as Code
Policy as Code
Compliance Automation
Security Configuration Management
Security Culture
Shared Security Responsibility
Security Awareness Training
Threat Modeling
Security in CI/CD Pipeline
Static Application Security Testing (SAST)
Source Code Analysis
Security Rule Sets
False Positive Management
Dynamic Application Security Testing (DAST)
Runtime Security Testing
Vulnerability Detection
Penetration Testing Automation
Interactive Application Security Testing (IAST)
Real-time Security Analysis
Code Coverage Integration
Hybrid Testing Approach
Software Composition Analysis (SCA)
Dependency Vulnerability Scanning
License Compliance
Supply Chain Security
Container and Infrastructure Security
Container Security
Image Vulnerability Scanning
Runtime Security Monitoring
Container Isolation
Infrastructure Security
Network Security
Identity and Access Management
Encryption at Rest and in Transit
Kubernetes Security
Pod Security Standards
Network Policies
RBAC Configuration
Admission Controllers
Secrets Management
Secrets Lifecycle Management
Secret Creation and Distribution
Rotation and Expiration
Access Auditing
Secrets Management Tools
HashiCorp Vault
Secret Engines
Authentication Methods
Policy Management
Cloud Provider Solutions
AWS Secrets Manager
Azure Key Vault
Google Secret Manager
Secrets in CI/CD
Pipeline Secret Injection
Environment-Specific Secrets
Secret Scanning and Detection
Compliance and Governance
Regulatory Compliance
SOC 2
PCI DSS
GDPR
HIPAA
Compliance Automation
Policy Enforcement
Audit Trail Management
Compliance Reporting
Risk Management
Risk Assessment
Threat Intelligence
Incident Response Planning
Previous
11. Cloud Computing and DevOps
Go to top
Next
13. Advanced DevOps Practices