We may earn an affiliate commission when you visit our partners.
Udacity logo

Security and DevOps

Peter Zastoupil, Alex Pritchard, Kesha Williams, and Sareeta Panda
Learn about Git, version control and best practices for authorization and authentication. Use Jenkins to build a CI/CD pipeline to deploy code to production.

What's inside

Syllabus

Implement authentication on a Spring Boot application using a JSON Web Token (JWT).
Refresh testing fundamentals. Use logging to get insights into your code and debug your applications. Get practice with two commonly used logging utilities: SLF4J and Log4J.
Read more
Splunk was founded in 2003 to make sense of machine-generated data. Here you’ll learn about what Splunk can be used for, how to install it, and how to use it for generating dashboards and more.
CI/CD
eCommerce Application

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops professional skills in authorization and authentication
Examines best practices in authorization and authentication
Teaches Spring Boot for building web applications
Introduces Splunk for data analytics and visualization
Utilizes Jenkins for building a CI/CD pipeline
Builds upon fundamental testing and logging concepts

Save this course

Save Security and DevOps to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Security and DevOps. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Security and DevOps will develop knowledge and skills that may be useful to these careers:
DevOps Engineer
Those pursuing a career as a DevOps Engineer may find value in this course. The exploration of tools like Jenkins and Splunk, and the focus on best practices for authorization and authentication will help them contribute to the team.
Security Architect
Security Architects will find this course's exploration of authentication mechanisms and best practices relevant to their role. These aspects are essential in designing and implementing secure systems.
Cybersecurity Analyst
Cybersecurity Analysts can strengthen their expertise in security principles through this course. It covers topics like authentication and authorization, which are vital for defending against cyber threats.
Information Security Manager
For those pursuing a career as an Information Security Manager, this course provides insights into best practices for authorization and authentication. These are critical aspects of information security management.
Web Developer
Web Developers seeking to enhance their skills in security and DevOps practices may find this course helpful. It covers topics like authentication and authorization, which are important for web application security.
Cloud Engineer
The emphasis on CI/CD pipelines and version control in this course may be beneficial for Cloud Engineers. These concepts are key in the cloud computing environment.
Data Analyst
Data Analysts can benefit from this course's introduction to Splunk. Splunk is a valuable tool for analyzing large datasets and gaining insights.
Software Developer
Software Developers can use this course to build a foundation in DevOps practices. The hands-on experience with Git, CI/CD pipelines, and authentication mechanisms will give them an advantage in collaborating effectively on software development projects.
Information Technology Project Manager
Information Technology Project Managers may benefit from this course's emphasis on CI/CD pipelines and best practices for authorization and authentication.
Network Administrator
Network Administrators may find this course's focus on security and authentication valuable. Implementing and maintaining secure network infrastructure requires expertise in these areas.
Business Analyst
Business Analysts who wish to enter the field of cybersecurity may find this course helpful. It provides a foundation in authentication and authorization, which are key concepts for understanding cybersecurity principles.
Database Administrator
Database Administrators may benefit from this course's emphasis on security and authentication. This knowledge can aid in protecting database systems from unauthorized access.
Security Engineer
A Security Engineer who utilizes Jenkins and Git may be stimulated by this course. The course's emphasis on CI/CD pipelines, authentication, and authorization align well with the security-oriented responsibilities of a Security Engineer.
Systems Administrator
Systems Administrators may find the topics on authentication and authorization in this course useful for enhancing the security of their systems.
IT Security Analyst
This course may be of interest to IT Security Analysts. The topics covered, like authentication and authorization, are important aspects of information security.

Reading list

We've selected five books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security and DevOps.
以小说形式讲述一个DevOps转型的旅程,突出了文化和组织变革的重要性。通过引人入胜的故事和实用建议,本书强调了DevOps如何提高效率、减少浪费和提高客户满意度。
DevOps领域的经典之作,强调文化和组织变化的重要性。提供实际案例和建议,帮助团队有效实施DevOps实践。
权威指南,介绍Log4j,使用广泛的Java日志记录库。提供详细的说明和示例,涵盖配置、布局和日志级别的最佳实践。
DevOps入门指南,以易于理解的方式解释基本概念和原则。提供非技术专业人士和希望了解DevOps如何改变软件开发和运维的任何人的概述。
网络安全领域入门读物,介绍道德黑客和渗透测试的概念和技术。涵盖攻击向量、漏洞利用和风险评估,有助于理解安全测试的基础。

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security and DevOps.
The Art of Black and White Photography
Less relevant
A-level Further Mathematics for Year 12 - Course 1:...
Less relevant
Automate Security and Compliance Scanning in AWS
Less relevant
Working with Files in C# 10
Less relevant
Microsoft 365 Administration: Managing Security Using...
Less relevant
Adobe XD UI/UX Design, prototype, and handoff from scratch
Less relevant
Work Smarter, Not Harder: Time Management for Personal &...
Less relevant
Import and Export Data to Microsoft Azure
Less relevant
English Composition
Less relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser