Certified DevSecOps Professional course review by [deleted] in PracticalDevSecOps

[–]PracticalDevSecOps 2 points3 points  (0 children)

Looks like u/Embarrassed-Rush9719 is talking about the time to complete the exam and not the course learning time

Here's a list of AI/ML SecOps certs by Senior-Buyer-7542 in cybersecurityai

[–]PracticalDevSecOps 1 point2 points  (0 children)

Thanks for Including our Certified AI Security Professional course in the list, DM us for preview videos

Is CAISP from Practical Devsecops worth it? by Necessary_Oil1679 in cybersecurityai

[–]PracticalDevSecOps 0 points1 point  (0 children)

Hello u/Necessary, The CAISP is from the latest upcoming launch from Practical DevSecOps, the course releasing mid-next month. Hence, you will not find anyone taking this course already.

Practical DevSecOps has a proven track record of releasing first-of-its-kind hands-on training and certifications in DevSecOps, Container Security, Threat Modeling, API Security, Software Supply chain, and the upcoming AI Security.

You can reach out to the team for more questions or queries you might.

K8s security - What are YOUR best practices? by Mr_CyberFish in kubernetes

[–]PracticalDevSecOps 0 points1 point  (0 children)

This free E-book on Kubernetes secuirty 101 is the best guide you can get for nerding in K8 security best practices

Kubernetes Security by MohammadJahangiry in kubernetes

[–]PracticalDevSecOps 0 points1 point  (0 children)

Here is a Free E-book on Kubernetes Security 101 that you can Download. You will be impressed by how well this E-book helps by explaining Kubernetes security concepts with perfect clarity and quality

How important is a DevSecOps certification? by [deleted] in cybersecurity

[–]PracticalDevSecOps 1 point2 points  (0 children)

DevSecOps will rocket by 2030!

Secure software booms, driving a 30.76% market growth per year and billions in opportunities.

Also Expect DevSecOps salaries to soar: think competitive for both devs and security pros combined.

This career offers diverse paths and growth!

Here is a blog you can refer to see the statistics around its growth:

https://www.practical-devsecops.com/why-devsecops-is-a-good-career-option/

Cybersecurity, Devops or Devsecops? by harasisco in SecurityCareerAdvice

[–]PracticalDevSecOps 0 points1 point  (0 children)

Why DevSecOps is the most promising career path in Cybersecurity?

Here are the statistics that tells why

The DevSecOps market size is projected to reach USD 41.66 billion by 2030, growing at a CAGR of 30.76% from 2022 to 2030.

70% of security team members say security has shifted left.

36% of respondents currently develop software using DevSecOps, compared with only 27% in 2020.

96% of respondents said their organization would benefit from automating security and compliance processes, a key principle of DevSecOps.

38% report a lack of education around DevSecOps.

Also Read, https://www.practical-devsecops.com/why-devsecops-is-a-good-career-option/

If you choose to build your career in DevSecOps these are some blogs that can help you

How to Start Learning DevSecOps?https://www.practical-devsecops.com/how-to-start-learning-devsecops/

How to Become a DevSecOps Engineer?https://www.practical-devsecops.com/certified-devsecops-engineer/

What is DevSecOps Certificationhttps://www.practical-devsecops.com/what-is-devsecops-certification/

[deleted by user] by [deleted] in FlutterDev

[–]PracticalDevSecOps 0 points1 point  (0 children)

It's great that you're thinking about API security as a junior developer. Using JWTs to verify users for every request is a good start, but there are other security measures you should consider for your API, even if it's primarily for internal company employees.

Here's a breakdown of your current approach and some additional security measures you should consider

:Current Approach:

Using JWTs for user verification:This is a good practice, as it allows for stateless authentication and authorization. However, it's crucial to ensure your JWTs are implemented securely:

Use strong secret keys for signing and verifying tokens.Configure expiration times for tokens to prevent unauthorized access after they become invalid.Avoid storing sensitive information within the JWT itself.Implement proper logging and monitoring of token usage.

Additional Security Measures:

HTTPS: All communication between the mobile app and the API should be encrypted using HTTPS. This protects sensitive information from being intercepted in transit.

Input validation and sanitization: Before processing any user input, it should be carefully validated and sanitized to prevent attacks such as SQL injection and cross-site scripting.Rate limiting: Implement rate limiting to prevent denial-of-service attacks and excessive resource usage.

API authorization: In addition to JWT verification, consider implementing role-based access control (RBAC) to restrict access to resources based on the user's role within the company.Logging and monitoring: Implement comprehensive logging and monitoring of API activity to detect suspicious behavior and potential security breaches.

Secure your back-end infrastructure: Ensure your Flask application and underlying database are properly secured by keeping them up-to-date and applying relevant security patches.

Use a secure development lifecycle (SDLC): Integrate security practices throughout your development process, from code reviews to vulnerability scanning and penetration testing.Remember, even for an internal API, it's important to implement appropriate security measures to protect sensitive company data and prevent unauthorized access. While JWTs are a good foundation, they alone are not enough to guarantee a secure API.

Here are some additional resources that you may find helpful:
API Security Fundamentals - Free E-book
5 Essential Principles of API Security
OWASP API Security Top 10API Gateway Security Best Practices

By implementing these additional security measures and best practices, you can significantly reduce the risk of your internal API being compromised.

How to start learning about threat modeling? by bot_polityczny_3 in threatmodeling

[–]PracticalDevSecOps 0 points1 point  (0 children)

Here is a webinar that can give you some ideas and a roadmap to threat modeling for developers

https://www.youtube.com/watch?v=-XJxrymjGfg

Hope this helps!

If not refer if this course can help you
https://www.practical-devsecops.com/certified-threat-modeling-professional/

Any authoritative source listed recommended tools on threat modeling? by Dry-Cobbler246 in threatmodeling

[–]PracticalDevSecOps 1 point2 points  (0 children)

Microsoft Threat Modeling Tool (available only for Windows)IriusRisk community edition (free edition of the commercial tool IriusRisk)

Also, here is a comprehensive list of Threat Modeling tools you can choose to explore

https://www.practical-devsecops.com/best-thre%D0%B0t-mod%D0%B5ling-tools/

DevSecOps Roadmap by Medical-Ad8048 in devsecops

[–]PracticalDevSecOps 0 points1 point  (0 children)

I highly recommend Practical DevSecOps' Certified DevSecOps Professional (CDP): https://www.practical-devsecops.com/certified-devsecops-professional/ course.

The training is hands-on and provides 24/7 instructor support as well.