This repository is used to document my journey on getting a better foundational knowledge of "DevOps".
If you have questions and want to get involved then join the discord and share your questions and stories with the community.
Or contact us via Twitter, my handle is @MichaelCade1 you can find the authors for 2023 also on Twitter linked below.
Topic | Author | Date | Twitter Handle |
---|---|---|---|
DevSecOps | Michael Cade | 1st Jan - 6th Jan | @MichaelCade1 |
Secure Coding | Prateek Jain | 7th Jan - 13th Jan | @PrateekJainDev |
Continuous Build, Integration, Testing | Anton Sankov and Svetlomir Balevski | 14th Jan - 20th Jan | @a_sankov |
Continuous Delivery & Deployment | Anton Sankov | 21st Jan - 27th Jan | @a_sankov |
Runtime Defence & Monitoring | Ben Hirschberg | 28th Jan - 3rd Feb | @slashben81 |
Secrets Management | Bryan Krausen | 4th Feb - 10th Feb | @btkrausen |
Python | Rishab Kumar | 11th Feb - 17th Feb | @rishabk7 |
AWS | Chris Williams | 18th Feb - 24th Feb | @mistwire |
OpenShift | Dean Lewis | 25th Feb - 3rd Mar | @saintdle |
Databases | Taylor Riggan & Andrew Pruski | 4th Mar - 10th Mar | @triggan & @dbafromthecold |
Serverless | Kristi Perreault | 11th Mar - 17th Mar | @kperreault95 |
Service Mesh | Marino Wijay | 18th Mar - 24th Mar | @virtualized6ix |
Engineering for Day 2 Ops | Alistair Hey | 25th Mar - 31st Mar | @alistair_hey |
- [✔️] ♾️ 1 > 2022 Reflection & Welcome 2023
- [✔️] ♾️ 2 > The Big Picture: DevSecOps
- [✔️] ♾️ 3 > Think like an Attacker
- [✔️] ♾️ 4 > Red Team vs. Blue Team
- [✔️] ♾️ 5 > OpenSource Security
- [✔️] ♾️ 6 > Hands-On: Building a weak app
- [✔️] 🔐 7 > Secure Coding Overview
- [✔️] 🔐 8 > SAST Overview
- [✔️] 🔐 9 > SAST Implementation with SonarCloud
- [✔️] 🔐 10 > Software Composition Analysis Overview
- [✔️] 🔐 11 > SCA Implementation with OWASP Dependency Check
- [✔️] 🔐 12 > Secure Coding Practices
- [✔️] 🔐 13 > Additional Secure Coding Practices
- [✔️] ⚒️ > Container Image Scanning
- [✔️] ⚒️ > Container Image Scanning Advanced
- [✔️] ⚒️ > Fuzzing
- [✔️] ⚒️ > Fuzzing Advanced
- [✔️] ⚒️ > DAST
- [✔️] ⚒️ > IAST
- [✔️] ⚒️ > Practical Lab on IAST and DAST
- [✔️] 🚚 21 > Continuous Image Repository Scan
- [✔️] 🚚 22 > Continuous Image Repository Scan - Container Registries
- [✔️] 🚚 23 > Artifacts Scan
- [✔️] 🚚 24 > Signing
- [✔️] 🚚 25 > Systems Vulnerability Scanning
- [✔️] 🚚 26 > Containers Vulnerability Scanning
- [✔️] 🚚 27 > Network Vulnerability Scan
- [✔️] 🏃 28 > System monitoring and auditing
- [✔️] 🏃 29 > Application level monitoring
- [✔️] 🏃 30 > Detecting suspicious application behavior
- [✔️] 🏃 31 > Runtime network protections and policies
- [✔️] 🏃 32 > Vulnerability and patch management
- [✔️] 🏃 33 > Application runtime and network policies
- [] 🏃 34 > Runtime access control
- [✔️] 🐍 42 > Programming Language: Introduction to Python
- [✔️] 🐍 43 > Python Loops, functions, modules and libraries
- [✔️] 🐍 44 > Data Structures and OOP in Python
- [✔️] 🐍 45 > Debugging, testing and Regular expression
- [✔️] 🐍 46 > Web development in Python
- [✔️] 🐍 47 > Automation with Python
- [✔️] 🐍 48 > Let's build an App in Python
- [✔️] ☁️ 49 > AWS Cloud Overview
- [✔️] ☁️ 50 > Get a Free Tier Account & Enable Billing Alarms
- [✔️] ☁️ 51 > Infrastructure as Code (IaC) and CloudFormation
- [] ☁️ 52 >
- [] ☁️ 53 >
- [] ☁️ 54 >
- [] ☁️ 55 >
- [✔️] ⛑️ 56 > What does Red Hat OpenShift bring to the party? An Overview
- [] ⛑️ 57 > Understanding the OpenShift Architecture + Spinning up an instance
- [] ⛑️ 58 >
- [] ⛑️ 59 >
- [] ⛑️ 60 >
- [] ⛑️ 61 >
- [] ⛑️ 62 >