- پایتون
- هوش مصنوعی
- سی شارپ
- MS .NET Fundamentals آموزش برنامه نویسی مقدماتی C#
- Programming in C#1 – Windows Forms
- ASP.NET Core 10.0 and Blazor with Material
- ASP.NET Core 10.0 and Angular 20.0 with Material
- دوره NET Microservices ,DDD, CQRS,Vertical/Clean Architecture using Docker.
- API Security
- Fullstack Web Development
- دوره طراحی سیستم System Design
- دوره ASP.Net Core With EF Core
- دوره Test In .NET
- طراحی وب
- جاوا
- اندروید
- دوره گولنگ (golang) – مقدماتی
|
|
آرش فروغی |
|---|---|
|
|
100 ساعت |
|
|
DevOps |
کلاسهای فعال این دوره
استاد آرش فروغی
ترکیبی
کلاس پاییزی
- تاریخ شروع: 1404/10/19
- زمان برگزاری: 08:30 الی 13:30 جمعه ها
سرفصلهای دوره
: Fundamentals of Git
Introduction to Version Control Systems (VCS).
Installing and configuring Git.
Core concepts: repository, commit, staging area, and branches.
Essential commands: `git init`, `git add`, `git commit`, `git status`, `git log.
: Branching, Merging, and Collaboration
Understanding branching strategies (e.g., GitFlow, GitHub Flow).
Creating, switching, and managing branches (`git branch`, `git checkout`).
Merging branches (`git merge`) and resolving merge conflicts.
Rebasing (`git rebase`) for a cleaner project history.
Working with remote repositories on platforms like GitLab.
:Security in Git
:Secure Coding Practices
Implementing pre-commit hooks to scan for secrets and vulnerabilities before committing.
Utilizing `.gitignore` to prevent sensitive files from being tracked.
: Commit and Branch Security
Signing commits with GPG keys to verify authorship.
Protecting branches to enforce code reviews and prevent direct pushes to critical branches.
: Auditing and Access Control
Auditing Git logs for suspicious activity.
Managing repository access controls and permissions in GitLab.
: Core Concepts of Docker
Introduction to containers and virtualization.
Docker architecture: Docker Engine, Docker CLI, and Docker Hub.
Building and managing Docker images with `Dockerfile`.
Running and managing containers (`docker run`, `docker ps`, `docker stop`).
Understanding Docker networking: bridge, host, and overlay networks.
:Image Management and Optimization
Best practices for writing efficient and small `Dockerfile`s.
Multi-stage builds to reduce image size and attack surface.
Storing and sharing images using a container registry like Nexus.
: Container Security
:Image Security
Scanning Docker images for known vulnerabilities using tools like Trivy or Clair.
Using trusted and minimal base images.
Implementing image signing with Docker Content Trust.
: Container Runtime Security
Running containers with the least privilege (non-root users).
Using security profiles like AppArmor and Seccomp.
Implementing resource limits to prevent denial-of-service attacks.
:Kubernetes Architecture and Core Components
Introduction to container orchestration.
Master node components: API Server, etcd, Scheduler, Controller Manager.
Worker node components: Kubelet, Kube-proxy, Container Runtime.
Understanding Pods, Services, Deployments, and ReplicaSets.
Deploying stateful applications with StatefulSets and Persistent Volumes.
:Managing Applications with Kubernetes
- Declarative configuration with YAML
- Managing application deployments, scaling, and
- Exposing applications using Services (ClusterIP, NodePort, LoadBalancer).
- Health checks and self-healing with Liveness and Readiness
: Security in Kubernetes
:Authentication and Authorization
- Implementing Role-Based Access Control (RBAC) to define user and service account
- Securing the Kubernetes API Server with authentication and authorization
:Pod and Network Security
- Restricting container capabilities with Pod Security Policies (or the new Pod Security Admission).
- Isolating network traffic between pods using Network
: Secret Management
- Securely managing sensitive information like API keys and passwords with Kubernetes
- Integrating with external secret management solutions like HashiCorp
: Nginx Fundamentals
Installation and basic configuration of Nginx.
Serving static content and understanding the Nginx configuration file structure.
Setting up server blocks (virtual hosts).
: Advanced Nginx Configurations
Configuring Nginx as a reverse proxy for backend applications.
Implementing load balancing to distribute traffic across multiple servers.
Configuring caching to improve performance.
: Securing Nginx
:SSL/TLS Configuration
Enabling HTTPS with SSL/TLS certificates (e.g., from Let’s Encrypt).
Hardening SSL/TLS configuration to protect against common vulnerabilities.
: Access Control and Rate Limit
Restricting access based on IP address or other criteria.
Implementing rate limiting to mitigate DDoS attacks.
: Web Application Firewall (WAF)
Integrating a WAF like ModSecurity to protect against common web attacks (e.g., SQL injection, XSS).
:Introduction to Nexus
The role of an artifact repository in a DevOps pipeline.
Installing and configuring Nexus Repository Manager.
Understanding different repository types: hosted, proxy, and group.
:Managing Artifacts and Repositories
Configuring repositories for different package formats (e.g., Maven, npm, Docker).
Proxying public repositories to cache dependencies and improve build performance.
Uploading and managing your own artifacts in hosted repositories.
:Security in Nexus
:Access Control and User Management
Configuring user authentication and authorization with roles and privileges.
Integrating with LDAP or other external authentication systems.
:Vulnerability Scanning
Using Nexus Lifecycle (or integrating other tools) to scan artifacts for known security vulnerabilities.
: Repository Health Check
Monitoring the health and security of your repositories
:Prometheus Fundamentals
Introduction to time-series monitoring and the Prometheus architecture.
Installing and configuring Prometheus.
Understanding the pull-based metrics collection model.
: Metrics Collection and Querying
Instrumenting applications to expose metrics in the Prometheus format.
Using exporters to monitor third-party systems (e.g., Node Exporter for system metrics).
Querying metrics with the Prometheus Query Language (PromQL).
Configuring alerting rules with Alertmanager to notify on critical conditions.
: Securing Prometheus
:Securing Communication
Implementing TLS encryption for the Prometheus web UI and API endpoints.
Using authentication and authorization to restrict access to the Prometheus server.
:Securing Exporters
Securing metrics endpoints to prevent unauthorized access
:Introduction to Grafana
The importance of data visualization for monitoring and observability.
Installing and configuring Grafana.
Connecting Grafana to data sources like Prometheus.
: Creating Dashboards and Visualizations
Building and customizing dashboards with various panels (graphs, gauges, tables).
Using variables to create dynamic and interactive dashboards.
Organizing dashboards for different services and environments.
: Security in Grafana
:User and Team Management
Configuring user authentication and managing permissions with teams and roles.
: Secure Data Source Connections
Storing data source credentials securely.
: Dashboard Permissions
Controlling access to specific dashboards and folders.
: Fundamentals of CI/CD with GitLab
Introduction to CI/CD principles.
Configuring GitLab Runners to execute jobs.
Creating CI/CD pipelines with `.gitlab-ci.yml`.
Defining stages, jobs, and artifacts.
: Building and Testing Applications
Automating the build process for different types of applications.
Running automated tests (unit, integration) in the pipeline.
Building and pushing Docker images to a registry.
:Security in the CI/CD Pipeline (DevSecOps)
:Static Application Security Testing (SAST)
Integrating SAST tools (e.g., SonarQube, Snyk) to scan source code for vulnerabilities.
: Dynamic Application Security Testing (DAST)
Running DAST scans against running applications in a testing environment.
: Dependency Scanning
Scanning third-party libraries for known vulnerabilities.
: Secret Management in CI/CD
Using GitLab’s CI/CD variables and secrets management features securely.
:Introduction to Ansible
The principles of Infrastructure as Code (IaC) and configuration management.
Ansible architecture: control node, managed nodes, and inventory.
Writing and executing ad-hoc commands.
: Playbooks, Roles, and Inventory
Writing declarative automation with Ansible Playbooks.
Using variables, loops, and conditionals in playbooks.
Organizing automation with Ansible Roles.
Managing hosts with static and dynamic inventories.
:Security with Ansible
:Securely Managing Secrets
Using Ansible Vault to encrypt sensitive data like passwords and API keys.
:Security Automation
Automating security hardening tasks (e.g., configuring firewalls, applying security patches).
Running security compliance checks with Ansible.
: Secure Communication
Ensuring secure communication between the control node and managed nodes (SSH).
Road Map
توضیحات
سئوالات متداول
اساتید دوره
[sematec_teachers]
دیدگاهها
اولین نفری باشید که دیدگاهی را ارسال می کنید برای “دوره DevSecOps” لغو پاسخ

دیدگاهها
هیچ دیدگاهی برای این محصول نوشته نشده است.