Skip to main content

SKILup IT Learning

  • HOME
  • DevOps Institute
  • Certification Prep
  • All Courses
  • Subscribe
  • Sign In

  • All Content, Technical Aspects, On-Demand Events, Security, Open Source, Process

    Technical Aspects - Open Source

    2 Resource(s)
  • All Content, On-Demand Events, AIOps & MLOps, Security, Observability

    How To Connect DevSecOps, Observability and AIOps To Maximize Business Value

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Process

    The DevSecOps Journey

    4 Resource(s)
  • All Content, On-Demand Events, People & Culture, Security, Team Building

    Your Developer Autonomy Journey

    2 Resource(s)
  • All Content, On-Demand Events, Security, Open Source, Automation & Technology

    Why Self-Hosted is the New On-Prem for Open Source and Data Ownership

    3 Resource(s)
  • All Content, On-Demand Events, Security

    Transforming Information Security

    3 Resource(s)
  • All Content, Security

    Embedding API Security by Design into DevOps Pipelines

    3 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology

    DevOps: The Return of Security

    3 Resource(s)
  • All Content, Security

    Empowering Developers at the Intersection of AppSec and CloudSec

    2 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology

    Embedding Security Testing in Modern DevOps Pipelines

    3 Resource(s)
  • All Content, On-Demand Events, Security, Open Source, Automation & Technology

    Zero-Trust Networking Examples Across Multiple K8S Clusters, Using Neuvector

    3 Resource(s)
  • All Content, On-Demand Events, Security, Open Source, Automation & Technology

    What You Should Know About Risks in Open Source, from Vulnerabilities to Lock-in

    3 Resource(s)
  • All Content, Security, Author Book Series

    Author Series: Security Awareness Program Management

    5 Resource(s)
  • All Content, On-Demand Events, Security, Observability, Automation & Technology

    Improving Observability Through Modern Log Management

    3 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology

    Pentesting at Scale

    3 Resource(s)
  • All Content, On-Demand Events, Security, Observability, Automation & Technology

    Beyond Monitoring: The Rise of Observability Platform

    2 Resource(s)
  • All Content, On-Demand Events, CI/CD, Security, Automation & Technology

    How a Military Strategy Can Help Secure Your App Deployment Cycle

    3 Resource(s)
  • All Content, On-Demand Events, CI/CD, Security, Automation & Technology

    How to Integrate Security and Quality Into Your CI/CD Pipelines and What KPIs to Measure

    2 Resource(s)
  • All Content, On-Demand Events, Security, Kubernetes, Automation & Technology

    Kubernetes Workloads at Scale: Ensuring Security, Compliance and Operational Readiness

    2 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology

    The Security and Compliance Tax

    3 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology

    DevSecOps: Shifting Left for Application Security in your Pipelines

    2 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology

    CI Workflow Supply Chain: Security Risks and How to Find Them

    2 Resource(s)
  • All Content, On-Demand Events, Security, Open Source, Automation & Technology

    OS Project Pyrsia: How To Protect the Open Source Supply Chain

    1 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology

    DoD's cATO

    3 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology

    Your Developers Decide Your Security Posture, Not Your Security Teams

    2 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology

    From DevOps to DevSecOps

    3 Resource(s)
  • All Content, CI/CD, Security, Government, Value Stream Management

    How to Integrate the Software Bill of Materials Into the CI/CD Process

    2 Resource(s)
  • All Content, On-Demand Events, CI/CD, Security, Kubernetes, Automation & Technology

    Faster, Strong, More Secure Cloud-Native DevSecOps

    3 Resource(s)
  • All Content, Security, Certification Prep

    DevSecOps Foundation

    42 Resource(s)
  • All Content, Technical Aspects, Security, Learning Lite

    History of DevSecOps

    1 Resource(s)
  • All Content, Technical Aspects, Security, Government

    Thinking Upstream about White House Cybersecurity Executive Order 14028

    3 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Government, Learning Lite

    DevOps Impact on Governance, Risk and Compliance (GRC)

    1 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, SRE, Security

    How SRE Fits Into the DevSecOps World

    1 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security

    DevSecOps Panel: Who’s looking out for the developers??

    1 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security

    How to successfully integrate security into your DevOps

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security

    IT Modernization through DevSecOps

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security

    The SolarWinds Hack and the Executive Order on Cybersecurity happened – It is time to prepare

    1 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security

    Go Beyond DevSecOps to Continuous Security

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security

    Three Reasons Developers Struggle With AppSec… And How to Make it Better

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security

    Securing Your Pipes With A TACO

    2 Resource(s)
  • All Content, Technical Aspects, Security

    DevSecOps Principles

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security

    The Major Impact of Runtime Security Controls on Risks and Efficiency

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Kubernetes

    The Do’s and Don’ts of Kubernetes Security

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security

    DevSecOps: Moving Beyond SAST in Pipelines

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security

    Measuring the Whole Hole

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security

    Pipeline Security a Catalyst for DevSecOps

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Cloud Native/Serverless, Security, Automation & Technology

    Putting the “Sec” in DevSecOps: Automating Cloud Security as an Enabler

    2 Resource(s)
  • All Content, Technical Aspects, Security, Certification Prep, Learning Lite

    Preview to DevSecOps Foundation

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, CI/CD, Security

    A Practical Approach for Injecting Sec into DevOps

    3 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, CI/CD, Security

    Should I enforce security for Infrastructure as Code?

    1 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, CI/CD, Security

    CI/CD with Contrast Security

    1 Resource(s)
  • HOME
  • Contact Us
  • Certifications
  • DevOps Institute
  • Privacy Policy
  • Terms & Conditions
  • LinkedIn (Open in a new window)
  • Twitter (Open in a new window)
  • Podcast (Open in a new window)
© Copyright SKILup IT Learning 2022, Powered by DevOps Institute