DevSecOps Roadmap with Resouces
A comprehensive collection of DevSecOps learning resources including videos, blogs, tools, and hands-on labs.
1. Git (Version Control System)
DevSecOps relies on Everything as Code (EaC). Git is the most widely used VCS.
2. CI/CD (Continuous Integration & Delivery)
CI/CD pipelines are the backbone of modern DevOps and Cloud-Native systems.
- VIDEO GitLab Beginner Tutorial β Raghav Pal Watch
- VIDEO Introduction to Jenkins, CI/CD, and DevOps β Valentin Despa Watch
- VIDEO Best Practices for Securing CI/CD Pipelines β Victoria Almazova Watch
- VIDEO CI/CD Platform in AWS β Mohamed Labouardy Watch
- VIDEO Continuous Delivery from First Principles β Tom Watch
- VIDEO Let's Build a CI/CD Pipeline β Jean De Klerk Watch
- VIDEO Intro to CI/CD with Python β Chris Arceneaux Watch
- VIDEO GitLab CI/CD β Johan Duran Watch
- VIDEO CI/CD Pipeline in Azure β Benjamin Hodge Watch
- VIDEO Continuous Integration with GitLab CI β Pete Johanson Watch
- VIDEO GitLab Workflow β GitLab Watch
- VIDEO From Dev to Prod with GitLab CI β Stephan Hochdorfer Watch
- VIDEO Scaling Continuous Deployment β Tony Savor Watch
- VIDEO Continuous Delivery with Jenkins β Gianluca Arbezzano Watch
3. Artifact Management
Artifact repositories store and control deployable binaries securely.
- VIDEO Introduction to Artifactory on the JFrog Platform β Melissa Watch
- VIDEO How to Integrate Nexus with Jenkins and Upload Artifacts β Madhu Sudhan Reddy Watch
- VIDEO Six Reasons to Use a Repository Manager Now β Tim OβBrien Watch
- VIDEO Sample DevOps Project: NexusβArtifactory Uploader Jenkins Pipeline β Madhu Sudhan Reddy Watch
4. Infrastructure as Code (IaC)
Infrastructure is treated like software to enable speed and consistency.
- VIDEO Holistic Configuration Management at Facebook β Chunqiang Tang Watch
- VIDEO SaltStack Is More Than Just Configuration Management β Thomas Hatch Watch
- VIDEO DSC in the Configuration Management Tool World β Ben Gelens Watch
- VIDEO Evolution of Configuration Management in a DevOps World β Marisa Sawatphadungkij Watch
- VIDEO Integrating Configuration Management into Your Ecosystem β Sascha Bates Watch
- VIDEO Configuration Management with SaltStack: Zero to Hero β Wesley Whetstone Watch
- VIDEO Cloud-Native Configuration Management 2020 and Beyond β Eric Sorenson Watch
- VIDEO Puppet Automation Journey: Configuration Management & Cloud β Brendan Rosewarne Watch
5. Cloud Service Provider Platform
Modern development needs elastic, on-demand cloud platforms.
- VIDEO Introduction to AWS Security β Bill Reid Watch
- VIDEO AWS Security by Design β Shafreen Sayyed Watch
- VIDEO Advanced Security Best Practices Masterclass β Ian Massingham Watch
- VIDEO Fundamentals of AWS Cloud Security β Becky Weiss Watch
- VIDEO Security Best Practices: Well-Architected Way β Ben Potter Watch
- VIDEO Introduction to AWS Security Hub β Ely Kahn Watch
- VIDEO Cloud Security Architecture Workshop β Dave Shackleford Watch
- VIDEO Implementing DevSecOps in the Cloud β Jimmy Jenis Watch
6. Threat Modeling
Threat modeling helps quantify and reduce security risks.
7. Static Application Security Testing (SAST)
SAST analyzes source code to identify security vulnerabilities early in the SDLC.
- VIDEO Static Analysis Security Testing for Dummiesβ¦ and You β Kevin Fealey Watch
- VIDEO Application Security Testing β Semi Yulianto Watch
- VIDEO Static Analysis for Dynamic Assessments β Greg Patton Watch
- VIDEO Static Code Analysis: Scan All Your Code for Bugs β Jared DeMott Watch
- VIDEO Bug Hunting with Static Code Analysis β Nick Jones Watch
- VIDEO SAST with CI/CD Pipelines Using WhiteSource β Mohamad Radwan Watch
- VIDEO GitLab APEX SAST Walkthrough for Salesforce β Lucas C Watch
- VIDEO AST in CI/CD: How to Make It Work β Ofer Maor Watch
8. Dynamic Application Security Testing (DAST)
DAST tests running applications to identify security vulnerabilities from the outside.
- VIDEO Dynamic Security Testing with OWASP ZAP β Omer Levi Hevroni Watch
- VIDEO Practical Dynamic Application Security Testing in the Enterprise β Nicholas Kenney Watch
- VIDEO Baby Steps to Security Testing β Christina Thalayasingam Watch
- VIDEO Automated Static & Dynamic Security Analysis of Mobile Apps β Raveendar & Rajesh Watch
9. Security as Code
Security as Code embeds security controls, policies, and checks directly into code and pipelines.
10. Compliance as Code
If hardening can be done using Infrastructure as Code tools, why canβt compliance be automated as code?
- VIDEOCompliance as Code: Automate Compliance Using Open Source Technology β RedHat
- VIDEOContinuous Assurance and Continuous Compliance via Data, Graph, Query and Code β Erkang Zheng
- VIDEOManaging Compliance as Code: Using Chef InSpec for All Its Possibilities β Chef
- VIDEOCompliance as Code β Lessons Learned From Regulated Organizations β Sergiu Bodiu
- VIDEOCompliance As Code β Webinar β Anitian
- VIDEOException Handling: Compliance as Code β Chef
- VIDEOInfrastructure and Compliance as Code for Universities β Blake Dworaczyk, Adam Mikeal, Nick Rycar
- VIDEODevSecOps Delight with Compliance as Code β Anthony Rees
- VIDEOInSpec Compliance as Code β Kent Picat Gruber