دوره DevSecOps

در دوره DevSecOps یاد می‌گیری چگونه امنیت را به‌صورت یکپارچه در تمام مراحل توسعه و استقرار نرم‌افزار پیاده‌سازی کنی. این دوره مفاهیم DevOps را با اصول امنیت سایبری ترکیب می‌کند تا بتوانی از مرحله کدنویسی تا استقرار، امنیت را در چرخه CI/CD حفظ کنی. مباحثی مانند مدیریت آسیب‌پذیری، تست امنیتی خودکار، Container Security، Infrastructure as Code و مانیتورینگ مداوم در این آموزش به‌صورت عملی تدریس می‌شود. هدف دوره، تربیت متخصصانی است که بتوانند تیم‌های توسعه و امنیت را به هم متصل کرده و نرم‌افزارهایی امن‌تر و پایدارتر تولید کنند.

13,900,000 تومان

دوره DevSecOps
نام استاد

آرش فروغی

زمان دوره

100 ساعت

پیش نیاز

DevOps

کلاس‌های فعال این دوره

سرفصل‌های دوره

   :  Fundamentals of Git

 Introduction to Version Control Systems (VCS).

 Installing and configuring Git.

 Core concepts: repository, commit, staging area, and branches.

Essential commands: `git init`, `git add`, `git commit`, `git status`, `git log.

: Branching, Merging, and Collaboration

 Understanding branching strategies (e.g., GitFlow, GitHub Flow).

 Creating, switching, and managing branches (`git branch`, `git checkout`).

 Merging branches (`git merge`) and resolving merge conflicts.

 Rebasing (`git rebase`) for a cleaner project history.

 Working with remote repositories on platforms like GitLab.

:Security in Git

:Secure Coding Practices

  Implementing pre-commit hooks to scan for secrets and vulnerabilities before committing.

  Utilizing `.gitignore` to prevent sensitive files from being tracked.

: Commit and Branch Security

  Signing commits with GPG keys to verify authorship.

  Protecting branches to enforce code reviews and prevent direct pushes to critical branches.

: Auditing and Access Control

  Auditing Git logs for suspicious activity.

  Managing repository access controls and permissions in GitLab.

      : Core Concepts of Docker

 Introduction to containers and virtualization.

 Docker architecture: Docker Engine, Docker CLI, and Docker Hub.

 Building and managing Docker images with `Dockerfile`.

 Running and managing containers (`docker run`, `docker ps`, `docker stop`).

 Understanding Docker networking: bridge, host, and overlay networks.

       :Image Management and Optimization

 Best practices for writing efficient and small `Dockerfile`s.

 Multi-stage builds to reduce image size and attack surface.

 Storing and sharing images using a container registry like Nexus.

      : Container Security

:Image Security

  Scanning Docker images for known vulnerabilities using tools like Trivy or Clair.

  Using trusted and minimal base images.

  Implementing image signing with Docker Content Trust.

: Container Runtime Security

  Running containers with the least privilege (non-root users).

  Using security profiles like AppArmor and Seccomp.

  Implementing resource limits to prevent denial-of-service attacks.

    :Kubernetes Architecture and Core Components

 Introduction to container orchestration.

 Master node components: API Server, etcd, Scheduler, Controller Manager.

 Worker node components: Kubelet, Kube-proxy, Container Runtime.

 Understanding Pods, Services, Deployments, and ReplicaSets.

 Deploying stateful applications with StatefulSets and Persistent Volumes.

:Managing Applications with Kubernetes

  • Declarative configuration with YAML
  • Managing application deployments, scaling, and
  • Exposing applications using Services (ClusterIP, NodePort, LoadBalancer).
  • Health checks and self-healing with Liveness and Readiness

      : Security in Kubernetes

:Authentication and Authorization

  • Implementing Role-Based Access Control (RBAC) to define user and service account
  • Securing the Kubernetes API Server with authentication and authorization

:Pod and Network Security

  • Restricting container capabilities with Pod Security Policies (or the new Pod Security Admission).
  • Isolating network traffic between pods using Network

: Secret Management

  • Securely managing sensitive information like API keys and passwords with Kubernetes
  • Integrating with external secret management solutions like HashiCorp

     : Nginx Fundamentals

 Installation and basic configuration of Nginx.

 Serving static content and understanding the Nginx configuration file structure.

 Setting up server blocks (virtual hosts).

    : Advanced Nginx Configurations

 Configuring Nginx as a reverse proxy for backend applications.

 Implementing load balancing to distribute traffic across multiple servers.

 Configuring caching to improve performance.

     : Securing Nginx

:SSL/TLS Configuration

  Enabling HTTPS with SSL/TLS certificates (e.g., from Let’s Encrypt).

  Hardening SSL/TLS configuration to protect against common vulnerabilities.

: Access Control and Rate Limit

  Restricting access based on IP address or other criteria.

  Implementing rate limiting to mitigate DDoS attacks.

: Web Application Firewall (WAF)

  Integrating a WAF like ModSecurity to protect against common web attacks (e.g., SQL injection, XSS).

       :Introduction to Nexus

 The role of an artifact repository in a DevOps pipeline.

 Installing and configuring Nexus Repository Manager.

 Understanding different repository types: hosted, proxy, and group.

       :Managing Artifacts and Repositories

 Configuring repositories for different package formats (e.g., Maven, npm, Docker).

 Proxying public repositories to cache dependencies and improve build performance.

 Uploading and managing your own artifacts in hosted repositories.

       :Security in Nexus

:Access Control and User Management

 Configuring user authentication and authorization with roles and privileges.

  Integrating with LDAP or other external authentication systems.

 :Vulnerability Scanning

  Using Nexus Lifecycle (or integrating other tools) to scan artifacts for known security vulnerabilities.

: Repository Health Check

       Monitoring the health and security of your repositories

     :Prometheus Fundamentals

 Introduction to time-series monitoring and the Prometheus architecture.

 Installing and configuring Prometheus.

 Understanding the pull-based metrics collection model.

      : Metrics Collection and Querying

 Instrumenting applications to expose metrics in the Prometheus format.

 Using exporters to monitor third-party systems (e.g., Node Exporter for system metrics).

 Querying metrics with the Prometheus Query Language (PromQL).

 Configuring alerting rules with Alertmanager to notify on critical conditions.

      : Securing Prometheus

:Securing Communication

  Implementing TLS encryption for the Prometheus web UI and API endpoints.

  Using authentication and authorization to restrict access to the Prometheus server.

 :Securing Exporters

        Securing metrics endpoints to prevent unauthorized access

       :Introduction to Grafana

 The importance of data visualization for monitoring and observability.

 Installing and configuring Grafana.

 Connecting Grafana to data sources like Prometheus.

      : Creating Dashboards and Visualizations

Building and customizing dashboards with various panels (graphs, gauges, tables).

 Using variables to create dynamic and interactive dashboards.

 Organizing dashboards for different services and environments.

      : Security in Grafana

:User and Team Management

  Configuring user authentication and managing permissions with teams and roles.

: Secure Data Source Connections

  Storing data source credentials securely.

: Dashboard Permissions

 Controlling access to specific dashboards and folders.

      : Fundamentals of CI/CD with GitLab

 Introduction to CI/CD principles.

 Configuring GitLab Runners to execute jobs.

 Creating CI/CD pipelines with `.gitlab-ci.yml`.

 Defining stages, jobs, and artifacts.

      : Building and Testing Applications

Automating the build process for different types of applications.

Running automated tests (unit, integration) in the pipeline.

 Building and pushing Docker images to a registry.

      :Security in the CI/CD Pipeline (DevSecOps)

:Static Application Security Testing (SAST)

  Integrating SAST tools (e.g., SonarQube, Snyk) to scan source code for vulnerabilities.

: Dynamic Application Security Testing (DAST)

 

 Running DAST scans against running applications in a testing environment.

: Dependency Scanning

 Scanning third-party libraries for known vulnerabilities.

: Secret Management in CI/CD

  Using GitLab’s CI/CD variables and secrets management features securely.

     :Introduction to Ansible

 The principles of Infrastructure as Code (IaC) and configuration management.

 Ansible architecture: control node, managed nodes, and inventory.

 Writing and executing ad-hoc commands.

     : Playbooks, Roles, and Inventory

 Writing declarative automation with Ansible Playbooks.

 Using variables, loops, and conditionals in playbooks.

 Organizing automation with Ansible Roles.

 Managing hosts with static and dynamic inventories.

     :Security with Ansible

:Securely Managing Secrets

 Using Ansible Vault to encrypt sensitive data like passwords and API keys.

:Security Automation

 Automating security hardening tasks (e.g., configuring firewalls, applying security patches).

  Running security compliance checks with Ansible.

: Secure Communication

  Ensuring secure communication between the control node and managed nodes (SSH).

Road Map

کاتالوگ دوره

سئوالات متداول

اساتید دوره

[sematec_teachers]
دیدگاه‌ها

دیدگاهها

هیچ دیدگاهی برای این محصول نوشته نشده است.

اولین نفری باشید که دیدگاهی را ارسال می کنید برای “دوره DevSecOps”

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

درخواست مشاوره رایگان


محصولات مشابه