강의

멘토링

커뮤니티

Security & Network

/

Computer Security

DevSecOps Basic (/w SAST)

What is DevSecOps? Configure a CI build environment and an environment that automatically performs SAST checks during build

(4.7) 7 reviews

79 learners

Level Beginner

Course period Unlimited

  • taesun1114
이론 실습 모두
이론 실습 모두
devsecops
devsecops
owasp
owasp
CI/CD
CI/CD
sast
sast
SonarQube
SonarQube
Jenkins
Jenkins
grafana
grafana
이론 실습 모두
이론 실습 모두
devsecops
devsecops
owasp
owasp
CI/CD
CI/CD
sast
sast
SonarQube
SonarQube
Jenkins
Jenkins
grafana
grafana

What you will gain after the course

  • What is DevSecOps?

  • DevSecOps Models

  • CI/CD Pipeline SAST automatic inspection environment configuration

I've heard a lot about DevSecOps, but what exactly is it?

You can set goals for what a DevSecOps environment is and what efforts you should put into building it!

Security teams want to leverage DevOps (CI/CD) environments, but aren't sure where to start!

  • A self-assessment and goal-setting method presented using various DevSecOps criteria.

  • Example environment configuration using open source (Github, Jenkins, SonarQube, etc.) for configuring a DevSecOps environment

Learning Content

  • It was created with a focus on the basics of DevSecOps and setting up a practical environment.

  • Section 1: What is DevSecOps? , DevSecOps Models

  • Section 2: Configuring a CI Environment and Automated SAST (Source Code Vulnerability Checking) Scanning Environment in a CI Environment

  • Section 3: Monitoring Measures

Section (1) DevSecOps Basic

Let's take a look at what DevSecOps is and how to plan for its implementation in your environment.

We review DevSecOps models proposed by various overseas companies and present our own assessment and future plans.

Section (2) CI & SAST

This hands-on exercise demonstrates how to implement automated SAST (Source Code Vulnerability Scanning Tool) inspection to apply Sec in a DevOps environment.

  • Tools used: Jenkins & Github

Section (3) Monitor

We propose a monitoring plan to ensure normal operation after SAST automatic inspection.

  • Tools used: Prometheus & Grafana

Practice environment

  • Operating System and Version (OS): The environment in which Docker runs (Windows, Linux OSX, Mac, etc.)

  • Tools used: Docker Desktop

  • PC specifications: A practical environment will be created using a total of five Docker images. Any specifications that can run approximately five Docker containers simultaneously are sufficient.

Learning Materials

  • Lecture materials are provided in PDF format, and the code required for practice is provided in the attached files for each lecture.


Player Knowledge and Precautions

  • This article primarily introduces a method for building an automated SAST/DAST vulnerability inspection environment based on a CI/CD pipeline for building a DevSecOps environment.

  • Since we cannot cover all the various SAST/DAST tools, such as reducing false positive rates and improving detection rules for SAST/DAST, we would appreciate it if you could provide information based on the automated DevSecOps environment configuration.
    - We plan to continue producing a series of lectures on the topic of DevSecOps, and we plan to additionally write basic content on reducing false positives or enhancing detection rules based on open source tools (e.g. SonarQube, ZAP).


Recommended for
these people

Who is this course right for?

  • Anyone who wants to build a DevSecOps environment in their company

  • Anyone who is thinking about how to set goals and plans for building DevSecOps

Hello
This is

651

Learners

53

Reviews

12

Answers

4.5

Rating

6

Courses

Curriculum

All

23 lectures ∙ (3hr 19min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

7 reviews

4.7

7 reviews

  • abcd123123님의 프로필 이미지
    abcd123123

    Reviews 327

    Average Rating 5.0

    5

    26% enrolled

    • neobus71742389님의 프로필 이미지
      neobus71742389

      Reviews 11

      Average Rating 5.0

      5

      30% enrolled

      • cindy02276721님의 프로필 이미지
        cindy02276721

        Reviews 2

        Average Rating 5.0

        5

        30% enrolled

        • simonkim95님의 프로필 이미지
          simonkim95

          Reviews 2

          Average Rating 5.0

          5

          100% enrolled

          I really enjoyed the lecture on gitlab - sast (sonarqube) integration. I was at a loss as to how to integrate SAST tools into the ci/cd process at my company. This lecture seems to have given me some direction. Although the tool we'll be adopting isn't sonarqube, it will be very helpful for communicating with tool vendors.

          • lakescript님의 프로필 이미지
            lakescript

            Reviews 1

            Average Rating 5.0

            5

            100% enrolled

            They fully captured the core concepts of a CI pipeline that can be configured in practice. In particular, the tips on how to apply other security tools besides SonarQube, which was used in the practical session, during additional lectures were also very good. However, it would have been nice if there was a bit of theory on other security tools, including SonarQube! Nevertheless, it was a very substantial lecture. Thank you.

            $51.70

            taesun1114's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!