Application Security for Developers and DevOps Professionals

This course is part of multiple programs. Learn more

Instructor: John Rofrano

What you'll learn

  •   Explain security by design, learn to develop applications using security by design principles; perform defensive coding following OWASP principles.
  •   Describe IBM cloud container vulnerability; perform vulnerability scanning and pen testing with Kali Linux.
  •   Describe what to look for in app performance; perform troubleshooting using logging, stack trace, and log analytics.
  •   Discuss concepts like Golden Signals; list tools for monitoring and troubleshooting; and test monitoring in action with Prometheus and Grafana.
  • Skills you'll gain

  •   Data Security
  •   DevSecOps
  •   Vulnerability Scanning
  •   Continuous Monitoring
  •   Application Performance Management
  •   Development Environment
  •   System Monitoring
  •   Software Development Life Cycle
  •   Vulnerability Assessments
  •   Security Testing
  •   Threat Modeling
  •   Open Web Application Security Project (OWASP)
  •   Secure Coding
  •   Application Security
  • There are 4 modules in this course

    You will gain extensive knowledge on various practices, concepts, and processes for maintaining a secure environment, including DevSecOps practices that automate security integration across the software development lifecycle (SDLC), Static Application Security Testing (SAST) for identifying security flaws, Dynamic Analysis, and Dynamic Testing. You’ll also learn about creating a Secure Development Environment, both on-premise and in the cloud. You’ll explore the Open Web Application Security Project (OWASP) top application security risks, including broken access controls and SQL injections. Additionally, you will learn how monitoring, observability, and evaluation ensure secure applications and systems. You’ll discover the essential components of a monitoring system and how application performance monitoring (APM) tools aid in measuring app performance and efficiency. You’ll analyze the Golden Signals of monitoring, explore visualization and logging tools, and learn about the different metrics and alerting systems that help you understand your applications and systems. Through videos, hands-on labs, peer discussion, and the practice and graded assessments in this course, you will develop and demonstrate your skills and knowledge for creating and maintaining a secure development environment.

    Security Testing and Mitigation Strategies 

    OWASP Application Security Risks

    Security Best Practices , Final Project, and Assessment

    Explore more from Software Development

    ©2025  ementorhub.com. All rights reserved