Useful Links
Computer Science
Cybersecurity
DevSecOps and Securing CI/CD Pipelines
1. Foundations of DevSecOps
2. Understanding CI/CD Pipelines
3. Securing the Pre-Commit and Source Code Stage
4. Securing the Build Stage
5. Securing the Test Stage
6. Securing the Deployment Stage
7. Security in Operations and Post-Deployment
8. DevSecOps Tools and Technologies
9. Culture, Governance, and Organizational Change
Security in Operations and Post-Deployment
Runtime Security Monitoring
Web Application Firewall Implementation
WAF Deployment Models
Network-Based WAF
Host-Based WAF
Cloud-Based WAF
WAF Rule Management
Custom Rule Development
WAF Performance Optimization
Runtime Application Self-Protection
RASP Technology Overview
RASP Implementation Strategies
Application Performance Impact
RASP Integration with SIEM
Container Runtime Security
Container Behavior Monitoring
Anomaly Detection Systems
Runtime Policy Enforcement
Container Escape Detection
File Integrity Monitoring
Critical File Monitoring
Change Detection and Alerting
Integrity Violation Response
Kubernetes Runtime Security
Pod Security Monitoring
Network Traffic Analysis
Admission Controller Security
Runtime Security Tools
Falco
Sysdig Secure
Aqua Security
Security Monitoring and Observability
Security Information and Event Management
SIEM Architecture and Components
Log Collection and Aggregation
Event Correlation and Analysis
Security Analytics and Machine Learning
SIEM Tool Implementation
Splunk Security
IBM QRadar
Microsoft Sentinel
Elastic Security
Centralized Logging for Security
Log Collection Strategies
Log Format Standardization
Secure Log Transmission
Log Storage and Retention
Log Analysis and Search
Security Alerting and Notification
Alert Rule Definition
Alert Prioritization and Triage
Incident Escalation Procedures
Alert Fatigue Management
Security Metrics and Dashboards
Security KPI Development
Real-Time Security Dashboards
Executive Security Reporting
Trend Analysis and Forecasting
Vulnerability Management in Production
Continuous Vulnerability Assessment
Production Scanning Strategies
Vulnerability Scanner Integration
Risk-Based Vulnerability Management
Vulnerability Lifecycle Tracking
Patch Management Automation
Automated Patching Strategies
Patch Testing and Validation
Zero-Downtime Patching
Rollback Procedures
Configuration Management Security
Configuration Drift Detection
Security Baseline Enforcement
Configuration Change Management
Compliance Monitoring
Incident Response and Recovery
Incident Response Planning
Incident Response Team Structure
Incident Classification and Severity
Response Procedures and Playbooks
Communication Plans
Automated Incident Response
Security Orchestration and Automated Response
Incident Response Playbook Automation
Integration with Security Tools
Response Time Optimization
Digital Forensics and Investigation
Evidence Collection and Preservation
Forensic Analysis Tools
Chain of Custody Management
Legal and Compliance Considerations
Business Continuity and Disaster Recovery
Recovery Time Objectives
Recovery Point Objectives
Backup and Restore Procedures
Disaster Recovery Testing
Previous
6. Securing the Deployment Stage
Go to top
Next
8. DevSecOps Tools and Technologies