GitHub Advanced Security
Learn about vulnerability identification, workflow security, and robust security implementation on Github
Get Access NowUSD $29.00
USD $60.00
(50% off)
This Course Includes:
1 Year Access
2
Hours of Video
117
Lectures
9
Follow Alongs
86
Flashcards
3
Practice Exams
Individual Video Quizlets
Certificate of Completion
Course Introduction
8m 50s
Course Format Disclaimer
52s
Lecture
Watch
What is Github Foundations
42s
Lecture
Watch
Who is GHAS Certification for?
49s
Lecture
Watch
Github Certification Roadmap
19s
Lecture
Watch
Github Certification Roadmap for Security
1m 4s
Lecture
Watch
How long to Study
1m
Lecture
Watch
How to pass the Exam
39s
Lecture
Watch
GHAS Exam Guide
38s
Lecture
Watch
Where to take the Exam
45s
Lecture
Watch
How does Exam Grading Work?
18s
Lecture
Watch
Types of Questions
22s
Lecture
Watch
Unscored Questions
41s
Lecture
Watch
Exam Duration
41s
Lecture
Watch
Github Advanced Security Overview
30m 51s
Git Overview
53s
Lecture
Watch
Github Overview
59s
Lecture
Watch
Git Terms - Part 1
39s
Lecture
Watch
Git Terms - Part 2
51s
Lecture
Watch
Git Terms - Part 3
1m 2s
Lecture
Watch
Git Terms - Part 4
50s
Lecture
Watch
Github Repo Overview
50s
Lecture
Watch
Git Commit Overview
49s
Lecture
Watch
Git Branch Overview
1m 9s
Lecture
Watch
Git Remote to UpStream or DownStream
31s
Lecture
Watch
Advanced Security Overview
35s
Lecture
Watch
GHAS Enabled Plans - Part 1
40s
Lecture
Watch
GHAS Enabled Plans - Part 2
1m 9s
Lecture
Watch
Github Security - Part 1
1m 1s
Lecture
Watch
Github Security - Part 2
50s
Lecture
Watch
GHAS Use Cases
58s
Lecture
Watch
GHAS Components
1m
Lecture
Watch
Taking action on Alerts
1m 30s
Lecture
Watch
How to enable GHAS
1m 11s
Lecture
Watch
How to enable GHAS Automatically
1m 22s
Lecture
Watch
Which GHAS do you have?
57s
Lecture
Watch
GHAS Introduction - Follow Along
2m 44s
Follow Along
Watch
GHAS Introduction - Follow Along 2
8m 21s
Follow Along
Watch
Security Overview
5m 3s
What is a Security Vulnerability?
1m 11s
Lecture
Watch
Types of Security Vulnerabilities
1m 8s
Lecture
Watch
0 Day Vulnerabilities
24s
Lecture
Watch
Most Common Vulnerabilities
23s
Lecture
Watch
Finding Vulnerabilities in Github
55s
Lecture
Watch
Github Advisory Database
1m 2s
Lecture
Watch
Secret Scanning
13m 34s
Secret Scanning Overview
31s
Lecture
Secret Scanning Locations
22s
Lecture
Enabling Secret Scanning
6s
Lecture
Secret Scanning Partner Program
33s
Lecture
Partner Program Use Case
49s
Lecture
Starting a Scan
25s
Lecture
Scan Running Times
52s
Lecture
Secret Scanning Follow-along
2m 33s
Follow Along
Set Ignore Follow-along
3m 15s
Follow Along
Set Notifications Follow-along
4m 8s
Follow Along
Dependency Management
17m 39s
Open Source Popularity
20s
Lecture
Open Source Maintenance Problems
32s
Lecture
Dependency Graph for Open Source
12s
Lecture
Dependency Graph Examples
18s
Lecture
Dependabot Overview
15s
Lecture
Dependabot Use Case Example
1m 3s
Lecture
Dependabot Features
38s
Lecture
Enabling Dependabot
25s
Lecture
Dependabot Licensing for Private Repos
12s
Lecture
Dependabot Private Repository Workflow
20s
Lecture
Triaging Dependabot Vulnerabilities
1m 4s
Lecture
Dependabot Limitations
1m 2s
Lecture
Dependabot Follow-Along Part 1
6m 4s
Follow Along
Dependabot Follow-Along Part 2
5m 14s
Follow Along
Code Scanning
17m 31s
Code Scanning Overview
19s
Lecture
Supported Repositories
26s
Lecture
How Code Scanning Works
19s
Lecture
Starting a Scan
27s
Lecture
How to Enable
41s
Lecture
Code Scanning Setup Options
36s
Lecture
Code Scanning with Third Party Partners
46s
Lecture
Where to Implement Scanning
55s
Lecture
Scanning Trigger Types
1m
Lecture
Code Scanning Actions
13s
Lecture
Code Scanning Follow-along
11m 49s
Follow Along
CodeQL
36m 58s
Enabling Code Scanning
22s
Lecture
Third Party SARIF Files Overview
34s
Lecture
Uploading Third Party SARIF Files
25s
Lecture
Third Party SARIF File Example
28s
Lecture
Default Code Scanning
49s
Lecture
Custom Code Scanning
17s
Lecture
Code Language Detection Scanning
31s
Lecture
CodeQL Database Analysis
36s
Lecture
CodeQL Query Analysis
19s
Lecture
CodeQL Overview
26s
Lecture
Types of CodeQL Queries
19s
Lecture
CodeQL Queries Examples
13s
Lecture
CodeQL Queries DeepDive
45s
Lecture
Code Query Anatomy
39s
Lecture
Code Query Example
58s
Lecture
Code Query Suite
18s
Lecture
Types of Code Query Suites
32s
Lecture
Code Query Findings
30s
Lecture
CodeQL Costs
20s
Lecture
CodeQL Pack Types
34s
Lecture
Code Scanning Workflow
37s
Lecture
CodeQL Partner Integrations
30s
Lecture
Workflow Priority Order
25s
Lecture
Alerts Workflow
1m 8s
Lecture
Alerts Security Incident Example
59s
Lecture
CodeQL Follow-Along
23m 24s
Follow Along
GHAS Best Practices
10m 46s
Software Development Lifecycle (SDLC)
45s
Lecture
SDLC Restricting Access
36s
Lecture
SDLC Security Overview
38s
Lecture
SDLC Security Policies
29s
Lecture
SDLC Secret Scanning
37s
Lecture
SDLC Security Workflow
48s
Lecture
Types of Vulnerabilities
1m 8s
Lecture
Github Advisory Database
42s
Lecture
Developer Roles and Responsibilities
1m 1s
Lecture
Security Roles and Responsibilities
24s
Lecture
Admin Roles and Responsibilities
32s
Lecture
Additional Roles and Responsibilities
53s
Lecture
Notifying Responsible Parties
57s
Lecture
Triage Workflow based on Risk Ratings
1m 16s
Lecture
GHAS for Enterprise
5m 46s
Is GHAS right for me?
29s
Lecture
Enabling GHAS in Github
37s
Lecture
Levels of Enablement
49s
Lecture
Levels of Access to Alerts
52s
Lecture
Levels of Access to Alerts Example
33s
Lecture
Required Level of Access
31s
Lecture
Security Overview
30s
Lecture
GHAS Logging
36s
Lecture
API Endpoints for Security
49s
Lecture