YoVDO

Applying Governance to CI/CD Pipelines - Mitigating Software Risks

Offered By: Linux Foundation via YouTube

Tags

IT Governance Courses Software Development Courses Cybersecurity Courses Risk Management Courses CI/CD Courses Compliance Courses Access Control Courses Automated testing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a Linux Foundation webinar on applying governance to CI/CD pipelines in light of the SolarWinds hack. Delve into the role of CI/CD in cybersecurity events, learn how to implement IT governance principles in CI/CD processes, and discover strategies to mitigate software risks. Gain insights on continuous delivery, the CI/CD ecosystem, and the importance of governance, risk, and compliance in IT. Examine practical approaches to building robust CI/CD pipelines, including role-based access control, unit tests, and automated pipeline governance. Understand the significance of monitoring controls and audit trails in maintaining secure software development practices.

Syllabus

Introduction
SolarWinds Hack
Software Failures
Why Governance
CICD Governance
What is CICD
CICD vs CICD
Continuous Delivery
CICD Ecosystem
Governance
Risk
Compliance
IT Governance
How to Build Particular
Why Build Particular
Monitoring Control
SolarWinds
RoleBased Access Control
Unit Tests
Deployment
Harness Audit Trail
Automated Pipeline Governance
Closing


Taught by

Linux Foundation

Tags

Related Courses

Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Computing, Storage and Security with Google Cloud Platform
Google via Coursera