Infrastructure and Ops Superstream Series - Building Security Into Your Development Lifecycle

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size2.8 GB
  • Uploaded Byfreecoursewb
  • Downloads40
  • Last checkedJun. 12th '22
  • Date uploadedJun. 09th '22
  • Seeders 8
  • Leechers13

Infohash : 46FD591EC7D7A80C3361A4635B737D518E5EC815

Infrastructure & Ops Superstream Series: Building Security Into Your Development Lifecycle



https://CourseMega.com

Instructors: Sam Newman, ...
September 2021 | Duration: 3h 11m
Video: MP4 1920x1080 48 KHz | English
Size: 2.9 GB

Sponsored by Aqua and Palo Alto Networks

Security can’t be added in at the end. We need to build it into everything we do (“pull left”). So how can developers get involved in building safer, more secure software? And what new skills do you need to learn to do so?

About the Infrastructure & Ops Superstream Series: This five-part series of half-day online events details what you need to know to effectively manage existing legacy systems while migrating to modern, scalable, cost-effective infrastructures—with no interruption to your business. Each event day covers some of the most challenging and promising topics facing those working in infrastructure and operations today: continuous integration and delivery, cloud delivery, Kubernetes, microservices, and security.

Files:

[ CourseMega.com ] Infrastructure and Ops Superstream Series - Building Security Into Your Development Lifecycle
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here !
    • 00001 Welcome_and_Rory_McCune_-_Keynote_Maintaining_the_Software_Timeline_with_Supply_Chain_Security_Sponsored_by_Aqua_Security.de.srt (18.2 KB)
    • 00001 Welcome_and_Rory_McCune_-_Keynote_Maintaining_the_Software_Timeline_with_Supply_Chain_Security_Sponsored_by_Aqua_Security.en.srt (16.8 KB)
    • 00001 Welcome_and_Rory_McCune_-_Keynote_Maintaining_the_Software_Timeline_with_Supply_Chain_Security_Sponsored_by_Aqua_Security.es.srt (18.1 KB)
    • 00001 Welcome_and_Rory_McCune_-_Keynote_Maintaining_the_Software_Timeline_with_Supply_Chain_Security_Sponsored_by_Aqua_Security.fr.srt (19.0 KB)
    • 00001 Welcome_and_Rory_McCune_-_Keynote_Maintaining_the_Software_Timeline_with_Supply_Chain_Security_Sponsored_by_Aqua_Security.ja.srt (22.4 KB)
    • 00001 Welcome_and_Rory_McCune_-_Keynote_Maintaining_the_Software_Timeline_with_Supply_Chain_Security_Sponsored_by_Aqua_Security.ko.srt (19.3 KB)
    • 00001 Welcome_and_Rory_McCune_-_Keynote_Maintaining_the_Software_Timeline_with_Supply_Chain_Security_Sponsored_by_Aqua_Security.mp4 (163.5 MB)
    • 00001 Welcome_and_Rory_McCune_-_Keynote_Maintaining_the_Software_Timeline_with_Supply_Chain_Security_Sponsored_by_Aqua_Security.zh.srt (15.6 KB)
    • 00001 Welcome_and_Rory_McCune_-_Keynote_Maintaining_the_Software_Timeline_with_Supply_Chain_Security_Sponsored_by_Aqua_Security.zh_tw.srt (15.6 KB)
    • 00002 Taylor_Smith_-_Keynote_Deep_Dive_into_Secure_Container_Development_Pipelines_Sponsored_by_Palo_Alto_Networks.de.srt (13.9 KB)
    • 00002 Taylor_Smith_-_Keynote_Deep_Dive_into_Secure_Container_Development_Pipelines_Sponsored_by_Palo_Alto_Networks.en.srt (12.8 KB)
    • 00002 Taylor_Smith_-_Keynote_Deep_Dive_into_Secure_Container_Development_Pipelines_Sponsored_by_Palo_Alto_Networks.es.srt (13.6 KB)
    • 00002 Taylor_Smith_-_Keynote_Deep_Dive_into_Secure_Container_Development_Pipelines_Sponsored_by_Palo_Alto_Networks.fr.srt (14.3 KB)
    • 00002 Taylor_Smith_-_Keynote_Deep_Dive_into_Secure_Container_Development_Pipelines_Sponsored_by_Palo_Alto_Networks.ja.srt (16.4 KB)
    • 00002 Taylor_Smith_-_Keynote_Deep_Dive_into_Secure_Container_Development_Pipelines_Sponsored_by_Palo_Alto_Networks.ko.srt (14.6 KB)
    • 00002 Taylor_Smith_-_Keynote_Deep_Dive_into_Secure_Container_Development_Pipelines_Sponsored_by_Palo_Alto_Networks.mp4 (137.7 MB)
    • 00002 Taylor_Smith_-_Keynote_Deep_Dive_into_Secure_Container_Development_Pipelines_Sponsored_by_Palo_Alto_Networks.zh.srt (12.0 KB)
    • 00002 Taylor_Smith_-_Keynote_Deep_Dive_into_Secure_Container_Development_Pipelines_Sponsored_by_Palo_Alto_Networks.zh_tw.srt (12.0 KB)
    • 00003 Ping_Look_-_Meet_the_Expert.de.srt (70.0 KB)
    • 00003 Ping_Look_-_Meet_the_Expert.en.srt (65.5 KB)
    • 00003 Ping_Look_-_Meet_the_Expert.es.srt (68.7 KB)
    • 00003 Ping_Look_-_Meet_the_Expert.fr.srt (72.9 KB)
    • 00003 Ping_Look_-_Meet_the_Expert.ja.srt (84.5 KB)
    • 00003 Ping_Look_-_Meet_the_Expert.ko.srt (73.5 KB)
    • 00003 Ping_Look_-_Meet_the_Expert.mp4 (656.5 MB)
    • 00003 Ping_Look_-_Meet_the_Expert.zh.srt (61.2 KB)
    • 00003 Ping_Look_-_Meet_the_Expert.zh_tw.srt (61.2 KB)
    • 00004 Chris_Cochran_-_Threat_Intelligence_the_EASY_Way.de.srt (64.2 KB)
    • 00004 Chris_Cochran_-_Threat_Intelligence_the_EASY_Way.en.srt (59.9 KB)
    • 00004 Chris_Cochran_-_Threat_Intelligence_the_EASY_Way.es.srt (62.7 KB)
    • 00004 Chris_Cochran_-_Threat_Intelligence_the_EASY_Way.fr.srt (66.7 KB)
    • 00004 Chris_Cochran_-_Threat_Intelligence_the_EASY_Way.ja.srt (78.6 KB)
    • 00004 Chris_Cochran_-_Threat_Intelligence_the_EASY_Way.ko.srt (67.1 KB)
    • 00004 Chris_Cochran_-_Threat_Intelligence_the_EASY_Way.mp4 (593.5 MB)
    • 00004 Chris_Cochran_-_Threat_Intelligence_the_EASY_Way.zh.srt (55.0 KB)
    • 00004 Chris_Cochran_-_Threat_Intelligence_the_EASY_Way.zh_tw.srt (55.0 KB)
    • 00005 Liran_Tal_-_Proactive_Controls_for_Supply_Chain_Security.de.srt (68.0 KB)
    • 00005 Liran_Tal_-_Proactive_Controls_for_Supply_Chain_Security.en.srt (63.6 KB)
    • 00005 Liran_Tal_-_Proactive_Controls_for_Supply_Chain_Security.es.srt (67.3 KB)
    • 00005 Liran_Tal_-_Proactive_Controls_for_Supply_Chain_Security.fr.srt (70.5 KB)
    • 00005 Liran_Tal_-_Proactive_Controls_for_Supply_Chain_Security.ja.srt (85.0 KB)
    • 00005 Liran_Tal_-_Proactive_Controls_for_Supply_Chain_Security.ko.srt (71.8 KB)
    • 00005 Liran_Tal_-_Proactive_Controls_for_Supply_Chain_Security.mp4 (614.0 MB)
    • 00005 Liran_Tal_-_Proactive_Controls_for_Supply_Chain_Security.zh.srt (60.3 KB)
    • 00005 Liran_Tal_-_Proactive_Controls_for_Supply_Chain_Security.zh_tw.srt (60.3 KB)
    • 00006 Jed_Salazar_and_Natalia_Reka_Ivanko_-_Uncovering_a_Sophisticated_Kubernetes_Attack_in_Real_Time.de.srt (73.3 KB)
    • 00006 Jed_Salazar_and_Natalia_Reka_Ivanko_-_Uncovering_a_Sophisticated_Kubernetes_Attack_in_Real_Time.en.srt (68.8 KB)
    • 00006 Jed_Salazar_and_Natalia_Reka_Ivanko_-_Uncovering_a_Sophisticated_Kubernetes_Attack_in_Real_Time.es.srt (72.3 KB)
    • 00006 Jed_Salazar_and_Natalia_Reka_Ivanko_-_Uncovering_a_Sophisticated_Kubernetes_Attack_in_Real_Time.fr.srt (76.3 KB)
    • 00006 Jed_Salazar_and_Natalia_Reka_Ivanko_-_Uncovering_a_Sophisticated_Kubernetes_Attack_in_Real_Time.ja.srt (88.6 KB)
    • 00006 Jed_Salazar_and_Natalia_Reka_Ivanko_-_Uncovering_a_Sophisticated_Kubernetes_Attack_in_Real_Time.ko.srt (75.4 KB)
    • 00006 Jed_Salazar_and_Natalia_Reka_Ivanko_-_Uncovering_a_Sophisticated_Kubernetes_Attack_in_Real_Time.mp4 (749.2 MB)
    • 00006 Jed_Salazar_and_Natalia_Reka_Ivanko_-_Uncovering_a_Sophisticated_Kubernetes_Attack_in_Real_Time.zh.srt (64.7 KB)
    • 00006 Jed_Salazar_and_Natalia_Reka_Ivanko_-_Uncovering_a_Sophisticated_Kubernetes_Attack_in_Real_Time.zh_tw.srt (64.7 KB)
    • Bonus Resources.txt (0.4 KB)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce