This course will introduce in an outline fashion all major topics covered throughout the cohort as well as covering all major topics required for the Certified Scrum Developer credential.
This course is intended to train Agile Practitioners the necessary skills to prepare for a career in Modern Technology Organizations performing rapid Agile Solution Delivery with an emphasis on DevSecOps Culture. Using Scrum ceremonies and the Agile Methodology we can standardize the solution delivery process and bake security into each step. Agile Practitioner training helps you gain expertise in the principles of Documenting Requirements/User Stories, Acceptance Criteria, Story Sizing / Slicing, Scrum Ceremonies, Planning, Iterative Solution Delivery, Automated Testing and Technical Debt. To do so, we students will use Agile tools like Git, Cucumber, Azure DevOps, Jira and Jenkins. By the end of this course, students will learn the various aspects of the Agile Methodology.
You will implement and monitor security on networks and computer systems, and respond to security breaches.
Upon successful completion of this course, students will be able to:
This course is targeted toward an Information Technology (IT) professional who has familiarity with Windows and other operating systems, such as Macintosh, UNIX/Linux, who wants to: further a career in IT by acquiring a foundational knowledge of DevOps and Agile topics
Aopic 1A: Security Building Blocks
Topic 1A: Security Building Blocks
Topic 1B: Authentication Methods
Topic 1C: Cryptography Fundamentals
Topic 1D: Security Policy Fundamentals
Aopic 1A: Security Building Blocks
Topic 1A: Security Building Blocks
Topic 1B: Authentication Methods
Topic 1C: Cryptography Fundamentals
Topic 1D: Security Policy Fundamentals
Aopic 1A: Security Building Blocks
Topic 1A: Security Building Blocks
Topic 1B: Authentication Methods
Topic 1C: Cryptography Fundamentals
Topic 1D: Security Policy Fundamentals
Aopic 1A: Security Building Blocks
Topic 1A: Security Building Blocks
Topic 1B: Authentication Methods
Topic 1C: Cryptography Fundamentals
Topic 1D: Security Policy Fundamentals
Aopic 1A: Security Building Blocks
Topic 1A: Security Building Blocks
Topic 1B: Authentication Methods
Topic 1C: Cryptography Fundamentals
Topic 1D: Security Policy Fundamentals
Aopic 1A: Security Building Blocks
Topic 1A: Security Building Blocks
Topic 1B: Authentication Methods
Topic 1C: Cryptography Fundamentals
Topic 1D: Security Policy Fundamentals
Aopic 1A: Security Building Blocks
Topic 1A: Security Building Blocks
Topic 1B: Authentication Methods
Topic 1C: Cryptography Fundamentals
Topic 1D: Security Policy Fundamentals
Aopic 1A: Security Building Blocks
Topic 1A: Security Building Blocks
Topic 1B: Authentication Methods
Topic 1C: Cryptography Fundamentals
Topic 1D: Security Policy Fundamentals
Aopic 1A: Security Building Blocks
Topic 1A: Security Building Blocks
Topic 1B: Authentication Methods
Topic 1C: Cryptography Fundamentals
Topic 1D: Security Policy Fundamentals
Basic Windows skills and fundamental understanding of computer and networking concepts are required. Students can obtain this level of skill and knowledge by taking the following courses:
Introduction to Networks and the Internet and any one or more of the following
Kim, Gene, et al. The Phoenix Project: A Novel about It, DevOps, and Helping Your Business Win. IT Revolution Press, 2013. Provided.
Course Name | Date | Time | |
---|---|---|---|
Nothing Scheduled yet |