Security for Cloud Native Applications

Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Skills You’ll Get

1

Preface

2

Introduction to Cloud Native Applications

  • Introduction
  • Recap of cloud services
  • Cloud-native services
  • Cloud-native applications
  • Conclusion
  • References
3

Securing Modern Design Architectures

  • Introduction
  • Application programmable interfaces
  • Event-driven architectures
  • Microservices architecture
  • Conclusion
  • References
4

Containers and Kubernetes for Cloud Native Applications

  • Introduction
  • Containers technology
  • Container operating systems
  • Kubernetes as a Container orchestrator
  • Conclusion
  • References
5

Serverless for Cloud Native Applications

  • Introduction
  • Serverless fundamentals
  • Introducing AWS Lambda
  • Introducing Azure Functions
  • Introducing Google Cloud Functions
  • Conclusion
  • References
6

Building Secure CI/CD Pipelines

  • Introduction
  • CI/CD pipeline fundamentals
  • Static Application Security Testing tools
  • Software Composition Analysis tools
  • Static code analyzers for Infrastructure as Code 
  • Repositories and artifacts
  • Software supply chain
  • Best practices for securing the CI/CD pipeline
  • Conclusion
  • References
7

The 12-Factor Application Methodology

  • Introduction
  • The twelve-factor app methodology
  • Conclusion
  • References
8

Using Infrastructure as Code

  • Introduction
  • Introduction to Infrastructure as Code 
  • AWS CloudFormation
  • HashiCorp Terraform
  • Conclusion
  • References
9

Authorization and Policy as Code

  • Introduction
  • Introduction for Policy as Code
  • Introduction to the HashiCorp Sentinel framework
  • Introduction to Open Policy Agent 
  • Introduction to Cedar policy language
  • Conclusion
  • References
10

Implementing Immutable Infrastructure

  • Introduction
  • Introduction to immutable infrastructure
  • Building a golden image
  • Creating deployment pipeline
  • Conclusion
  • References
11

Encryption and Secrets Management

  • Introduction
  • Introducing encryption and key management services
  • Introduction to secrets management in cloud-native applications
  • Conclusion
  • References
12

Threat Management in Cloud Native Applications

  • Introduction
  • Vulnerability versus threat versus risk
  • Introducing vulnerability management in Cloud-native applications
  • Implementing threat intelligence at scale
  • Conclusion
  • References
13

Summary and Key Takeaways

  • Introduction
  • Introducing Pet Store
  • Key takeaways from the course
  • Recommendations for the readers of the course

Security for Cloud Native Applications

$ 386.55

Buy Now

Related Courses

All Course
scroll to top