Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

AZ-400: Implement security and validate code bases for compliance

Microsoft via Microsoft Learn

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
  • Learn DevSecOps principles to integrate security throughout your development lifecycle. Understand common vulnerabilities like SQL injection, implement continuous security validation in pipelines, conduct threat modeling, and use tools like GitHub CodeQL for automated security analysis.

    By the end of this module, you'll be able to:

    • Identify and understand SQL injection attacks and their impact on application security.
    • Explain DevSecOps principles and how security integrates throughout the development lifecycle.
    • Implement security validation at key points in your DevOps pipeline.
    • Conduct threat modeling to identify and prioritize security risks.
    • Use GitHub CodeQL for automated security analysis and vulnerability detection.
  • Learn how to implement open-source software securely, understand licensing implications, evaluate corporate concerns, and manage open-source components in enterprise environments.

    By the end of this module, you're able to:

    • Understand how modern software is built using open-source components and the benefits they provide.

    • Explain corporate concerns about open-source software including security vulnerabilities, license compliance, and supply chain risks.

    • Describe common open-source licenses including MIT, Apache, GPL, BSD, and their key characteristics.

    • Evaluate license implications for commercial software development and understand license compatibility.

    • Implement strategies for managing open-source components including inventory management, vulnerability scanning, and license compliance.

  • Learn Software Composition Analysis (SCA) to detect vulnerabilities and license compliance issues in open-source dependencies, implement GitHub Dependabot, integrate scanning tools into pipelines, and automate container security scanning.

    By the end of this module, you are able to:

    • Understand Software Composition Analysis (SCA) and why it's essential for managing open-source dependencies securely.

    • Inspect and validate code bases for license compliance and security vulnerabilities using automated tools.

    • Implement GitHub Dependabot to automatically detect vulnerable dependencies and create pull requests for security updates.

    • Integrate Software Composition Analysis checks into Azure Pipelines to scan dependencies during build and deployment processes.

    • Examine and configure SCA tools including Mend (WhiteSource), Snyk, OWASP Dependency-Check, and Azure Artifacts upstream sources.

    • Automate container image scanning to detect vulnerabilities in base images and application dependencies.

    • Interpret alerts from scanning tools and prioritize remediation based on severity, exploitability, and business impact.

  • Learn security monitoring and governance with Microsoft Defender for Cloud, Azure Policy, resource locks, Microsoft Defender for Identity, and GitHub Advanced Security integration for comprehensive DevSecOps protection.

    By the end of this module, you're able to:

    • Implement pipeline security best practices and secure DevOps workflows.

    • Configure Microsoft Defender for Cloud for threat protection and compliance monitoring.

    • Create and manage Azure policies for governance and compliance enforcement.

    • Understand policy initiatives, resource locks, and governance frameworks.

    • Deploy Microsoft Defender for Identity threat detection.

    • Integrate GitHub Advanced Security with Microsoft Defender for Cloud.

    • Configure GitHub Advanced Security features including code scanning, secret scanning, and dependency scanning.

Syllabus

  • Introduction to Secure DevOps
    • Introduction
    • Describe SQL injection attack
    • Understand DevSecOps
    • Explore the secure DevOps pipeline
    • Explore key validation points
    • Explore continuous security validation
    • Understand threat modeling
    • Explore CodeQL in GitHub
    • Module assessment
    • Summary
  • Implement open-source software
    • Introduction
    • Explore how software is built
    • What is open-source software?
    • Explore corporate concerns with open-source software components
    • Introduction to open-source licenses
    • Explore common open-source licenses
    • Examine license implications and ratings
    • Module assessment
    • Summary
  • Software Composition Analysis
    • Introduction
    • Inspect and validate code bases for compliance
    • Explore software composition analysis
    • Implement GitHub Dependabot alerts and security updates
    • Integrate software composition analysis checks into pipelines
    • Examine tools for assessing package security and license compliance
    • Automate container image scanning
    • Interpret alerts from scanner tools
    • Module assessment
    • Summary
  • Security monitoring and governance
    • Introduction
    • Implement pipeline security
    • Explore Microsoft Defender for Cloud
    • Examine Microsoft Defender for Cloud usage scenarios
    • Explore Azure Policy
    • Understand policies
    • Explore initiatives
    • Explore resource locks
    • Understand Microsoft Defender for Identity
    • Integrate GitHub Advanced Security with Microsoft Defender for Cloud
    • Configure GitHub Advanced Security for GitHub and Azure DevOps
    • Module assessment
    • Summary

Reviews

Start your review of AZ-400: Implement security and validate code bases for compliance

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.