Skip to main content

SKILup IT Learning

  • HOME
  • DevOps Institute
  • All Courses
  • Subscribe
  • Sign In

  • All Content, Security, Value Stream Management

    May Community Hour

    1 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Open Source, Process, Search All Content

    Technical Aspects - Open Source

    2 Resource(s)
  • All Content, On-Demand Events, AIOps & MLOps, Security, Observability, Search All Content

    How To Connect DevSecOps, Observability and AIOps To Maximize Business Value

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Process, Search All Content

    Technical Aspects - The DevSecOps Journey

    4 Resource(s)
  • All Content, On-Demand Events, People & Culture, Security, Team Building, Search All Content

    Your Developer Autonomy Journey

    2 Resource(s)
  • All Content, On-Demand Events, Security, Open Source, Automation & Technology, Search All Content

    Why Self-Hosted is the New On-Prem for Open Source and Data Ownership

    3 Resource(s)
  • All Content, On-Demand Events, Security, Search All Content

    Transforming Information Security

    3 Resource(s)
  • All Content, Security, Search All Content

    Embedding API Security by Design into DevOps Pipelines

    3 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology, Search All Content

    DevOps: The Return of Security

    3 Resource(s)
  • All Content, Security, Search All Content

    Empowering Developers at the Intersection of AppSec and CloudSec

    2 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology, Search All Content

    Embedding Security Testing in Modern DevOps Pipelines

    3 Resource(s)
  • All Content, On-Demand Events, Security, Open Source, Automation & Technology, Search All Content

    Zero-Trust Networking Examples Across Multiple K8S Clusters, Using Neuvector

    3 Resource(s)
  • All Content, On-Demand Events, Security, Open Source, Automation & Technology, Search All Content

    What You Should Know About Risks in Open Source, from Vulnerabilities to Lock-in

    3 Resource(s)
  • All Content, Security, Author Book Series, Search All Content

    Author Series: Security Awareness Program Management

    5 Resource(s)
  • All Content, On-Demand Events, Security, Observability, Automation & Technology, Search All Content

    Improving Observability Through Modern Log Management

    3 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology, Search All Content

    Pentesting at Scale

    3 Resource(s)
  • All Content, On-Demand Events, Security, Observability, Automation & Technology, Search All Content

    Beyond Monitoring: The Rise of Observability Platform

    2 Resource(s)
  • All Content, On-Demand Events, CI/CD, Security, Automation & Technology, Search All Content

    How a Military Strategy Can Help Secure Your App Deployment Cycle

    3 Resource(s)
  • All Content, On-Demand Events, CI/CD, Security, Automation & Technology, Search All Content

    How to Integrate Security and Quality Into Your CI/CD Pipelines and What KPIs to Measure

    2 Resource(s)
  • All Content, On-Demand Events, Security, Kubernetes, Automation & Technology, Search All Content

    Kubernetes Workloads at Scale: Ensuring Security, Compliance and Operational Readiness

    2 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology, Search All Content

    The Security and Compliance Tax

    3 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology, Search All Content

    DevSecOps: Shifting Left for Application Security in your Pipelines

    2 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology, Search All Content

    CI Workflow Supply Chain: Security Risks and How to Find Them

    2 Resource(s)
  • All Content, On-Demand Events, Security, Open Source, Automation & Technology, Search All Content

    OS Project Pyrsia: How To Protect the Open Source Supply Chain

    1 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology, Search All Content

    DoD's cATO

    3 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology, Search All Content

    Your Developers Decide Your Security Posture, Not Your Security Teams

    2 Resource(s)
  • All Content, On-Demand Events, Security, Automation & Technology, Search All Content

    From DevOps to DevSecOps

    3 Resource(s)
  • All Content, CI/CD, Security, Government, Value Stream Management, Search All Content

    How to Integrate the Software Bill of Materials Into the CI/CD Process

    2 Resource(s)
  • All Content, On-Demand Events, CI/CD, Security, Kubernetes, Automation & Technology, Search All Content

    Faster, Strong, More Secure Cloud-Native DevSecOps

    3 Resource(s)
  • All Content, Security, Certification Prep, Search All Content

    DevSecOps Foundation

    43 Resource(s)
  • All Content, Technical Aspects, Security, Learning Lite, Search All Content

    History of DevSecOps

    1 Resource(s)
  • All Content, Technical Aspects, Security, Government, Search All Content

    Thinking Upstream about White House Cybersecurity Executive Order 14028

    3 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Government, Learning Lite, Search All Content

    DevOps Impact on Governance, Risk and Compliance (GRC)

    1 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, SRE, Security, Search All Content

    How SRE Fits Into the DevSecOps World

    1 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Search All Content

    DevSecOps Panel: Who’s looking out for the developers??

    1 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Search All Content

    How to successfully integrate security into your DevOps

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Search All Content

    IT Modernization through DevSecOps

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Search All Content

    The SolarWinds Hack and the Executive Order on Cybersecurity happened – It is time to prepare

    1 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Search All Content

    Go Beyond DevSecOps to Continuous Security

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Search All Content

    Three Reasons Developers Struggle With AppSec… And How to Make it Better

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Search All Content

    Securing Your Pipes With A TACO

    2 Resource(s)
  • All Content, Technical Aspects, Security, Search All Content

    DevSecOps Principles

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Search All Content

    The Major Impact of Runtime Security Controls on Risks and Efficiency

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Kubernetes, Search All Content

    The Do’s and Don’ts of Kubernetes Security

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Search All Content

    DevSecOps: Moving Beyond SAST in Pipelines

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Search All Content

    Measuring the Whole Hole

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Security, Search All Content

    Pipeline Security a Catalyst for DevSecOps

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, Cloud Native/Serverless, Security, Automation & Technology, Search All Content

    Putting the “Sec” in DevSecOps: Automating Cloud Security as an Enabler

    2 Resource(s)
  • All Content, Technical Aspects, Security, Certification Prep, Learning Lite, Search All Content

    Preview to DevSecOps Foundation

    2 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, CI/CD, Security, Search All Content

    A Practical Approach for Injecting Sec into DevOps

    3 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, CI/CD, Security, Search All Content

    Should I enforce security for Infrastructure as Code?

    1 Resource(s)
  • All Content, Technical Aspects, On-Demand Events, CI/CD, Security, Search All Content

    CI/CD with Contrast Security

    1 Resource(s)
  • HOME
  • Contact Us
  • Certifications
  • DevOps Institute
  • Privacy Policy
  • Terms & Conditions
  • LinkedIn (Open in a new window)
  • Twitter (Open in a new window)
  • Podcast (Open in a new window)
© Copyright SKILup IT Learning 2022, Powered by DevOps Institute