Channel Avatar

Practical DevSecOps @UCsmwhUbG2kR8ruSh0ijRE8w@youtube.com

6.1K subscribers - no pronouns :c

We help you learn DevSecOps with hands-on browser-based labs


02:53
SBOMs, Signatures, & Zero Trust: Master Certified Software Supply Chain Security-Practical DevSecOps
01:04:15
πŸ”΄ From Reactive to Effective: Building Application Security that Works | #DevSecOps LIVE 🚨
00:26
πŸŒ™ DevSecOps After Dark: Boost Your Security Workflow with Our New Dark Mode UI | Practical DevSecOps
01:06
Unlock Your Learning Potential with Our AI-Powered "Explain to Me" Feature | Practical DevSecOps
00:36
How do you promote collaboration and communication in a DevSecOps culture? | DevSecOps Questions
00:31
What do you think are the key cultural aspects of DevSecOps? | DevSecOps Interview Questions
00:44
What are the differences between DevOps and DevSecOps? | Important DevSecOps Interview Questions
01:05
What are some weaknesses of DAST compared to other security methods | DevSecOps Interview Questions
00:42
How would you assess the effectiveness of DevSecOps Implementation across the organization?
00:41
How does Compliance as Code help in the DevSecOps process? | Important DevSecOps Interview Questions
00:47
How do you approach threat modeling? | Important DevSecOps Interview Questions
00:36
What are some of the benefits of SAST in the DevSecOps Process? | DevSecOps Interview Questions
00:43
What are the main challenges faced while implementing SCA? | Important DevSecOps Interview Questions
00:27
Why is it important to have security tool output in a machine-readable format? | DevSecOps Questions
02:10
Certified Container Security Expert (CCSE) Testimonial | Practical DevSecOps | Milica Mijatovic
00:34
Important DevSecOps Interview Questions | Certified DevSecOps Professional | Practical DevSecOps
00:32
Certified DevSecOps Professional Testimonial | @CyberSafeFoundation | Uchizi Gausi
00:39
Certified DevSecOps Professional Testimonial | @CyberSafeFoundation | Tessa Marie
00:41
Certified DevSecOps Professional Testimonial | @CyberSafeFoundation | Muluh Ngwie
02:40
Master the Art of API Security: Become a Certified Expert Today! | Practical DevSecOps |
03:06
Champion the Art of Product Security: Become a Certified Security Champion Today!
02:56
Master the Art of Threat Modeling: Become a Certified Expert Today! | Practical DevSecOps |
01:56
Master the Art of Container Security: Become a Certified Expert Today! | Practical DevSecOps
31:50
πŸ”΄ Putting A Leash On AI | #DevSecOps LIVE 🚨
00:49
Black Friday Cyber Monday Deals from Practical DevSecOps | Up to 15% Discount on all courses
01:14
🚨 Black Friday Cyber Monday Sale | Certified DevSecOps Professional Expert | Practial DevSecOps
01:57
Practical DevSecOps Student Testimonial | Certified DevSecOps Professional | Ashish Nimonkar
02:03
🚨 Practical DevSecOps Student Testimonial | Certified Container Security Expert | Balazs Greksza
03:07
Certified DevSecOps Professional | Most sought-after DevSecOps Training and Certification Program
01:10
Agile Threat Modeling Approaches: Strengthen Your Security in Fast-Paced Environments
07:18
Unveiling Threats: Harness Power of Attack Trees for Effective Security Analysis | Threat Modeling
02:06
Practical DevSecOps Student Testimonial | Certified DevSecOps Professional Expert | Lucas Chatelain
56:57
πŸ”΄ Addressing the Top 10 Kubernetes Risks | #DevSecOps LIVE 🚨
01:30
🚨 Practical DevSecOps Student Testimonial | Certified DevSecOps Professional Expert | Jason Lutz
02:48
Secure Kubernetes . Practice, understand, and implement Kubernetes Security | Practical DevSecOps
01:57
OWASP Kubernetes Top 10 | Secrets Management Failures #OWASP #Kubernetes #K8s
01:27
OWASP Kubernetes Top 10 | Outdated and Vulnerable Kubernetes Components #OWASP #Kubernetes #K8s
01:49
OWASP Kubernetes Top 10 | Misconfigured Cluster Components #OWASP #Kubernetes #K8s
01:52
OWASP Kubernetes Top 10 | Missing Network Segmentation Controls #OWASP #Kubernetes #K8s
01:58
OWASP Kubernetes Top 10 | Broken Authentication Mechanisms #OWASP #Kubernetes #K8s
01:42
OWASP Kubernetes Top 10 | Inadequate Logging and Monitoring #OWASP #Kubernetes #K8s
01:38
OWASP Kubernetes Top 10 | Lack of Centralized Policy Enforcement #OWASP #Kubernetes #K8s
02:42
OWASP Kubernetes Top 10 | Overly Permissive RBAC Configurations #OWASP #Kubernetes #K8s
03:09
OWASP Kubernetes Top 10 | Supply Chain Vulnerabilities #OWASP #Kubernetes #K8s
02:18
OWASP Kubernetes Top 10 | Insecure Workload Configurations #OWASP #Kubernetes #K8s
01:33:52
πŸ”΄ The Essential DevSecOps Controls in Azure That You Can Get Started with Today | #DevSecOps LIVE 🚨
57:18
πŸ”΄ Bringing Dev and Sec Together with Interactive Code Maps | #DevSecOps LIVE 🚨 #devsecops
01:04:09
πŸ”΄ Tools and Tactics to Rescue You from API Security Mistakes | #DevSecOps LIVE 🚨 #devsecops
50:07
πŸ”΄ Automating Security Policies for Cloud Through Examples | #DevSecOps LIVE 🚨 #devsecops
02:57
πŸ”΄ Installing CAIRIS and CAIRIS Models | #DevSecOps LIVE 🚨 #devsecops #threatmodeling
06:01
πŸ”΄ Requirements & Goals in CAIRIS | #DevSecOps LIVE 🚨 #devsecops #threatmodeling
02:15
πŸ”΄ Key Principles of CAIRIS | #DevSecOps LIVE 🚨 #devsecops #threatmodeling
01:49
🚨 Practical DevSecOps Student Testimonial | Certified Container Security Expert πŸ‘©πŸ»β€πŸ’» | David Montero
01:01:43
πŸ”΄ Threat Modelling and Beyond with CAIRIS | #DevSecOps LIVE 🚨 #devsecops #threatmodeling
01:21
How to Achieve DevSecOps Excellence | Practical DevSecOps #devsecops #infosec
00:59
🚨 THE 4 QUESTIONS OF THREAT MODELING | Certified Threat Modeling #devsecops #cybersecurity #shorts
00:59
🚨Threat Modeling Workflow | Certified Threat Modeling Professional #devsecops #cybersecurity #shorts
01:12
🚨 Challenges of Threat Modeling | Certified Threat Modeling Professional #devsecops #cybersecurity
01:29
🚨 Risk Rating Methodologies | Certified Threat Modeling Professional #devsecops #cybersecurity
02:00
Threat Modeling Simplified | Certified Threat Modeling Professional #devsecops #cybersecurity