Intermediate

Jenkins Security Best Practices

Step into the Spotlight with AppSec Expertise: Use coupon ‘SKILLUP30’ and get 30% Off on Individual Pro Annual Plans.
Learning Path
DevSecOps
Ideal for
Developer
DevOps
Security Engineer
5
Hours
7
Lessons
9
Cloud Labs

Jenkins is an open-source automation server designed for continuous integration and continuous delivery (CI/CD) of software applications. It provides a platform for automating various parts of the software development life cycle, including building, testing, and deploying applications. 

In this course, we take a hands-on approach to learning security best practices for Jenkins, right from simple concepts like AuditLogs and access control, to installing and configuring plugins securely.

We start off with lessons and accompanying labs for network security with Jenkins, learning about disabling SSH and hardening inbound connects. We then explore logging and monitoring best practices, where we look at AuditLogs and secure credentials.

Next up, we get into access control where we learn to limit the agent’s access, and role-based auth control. Finally, we’ll understand how to install, configure, and manage Jenkins plugins. This includes manual installation of plugins, safe HTML rendering, and No Executors Controller node.

You might also like these courses

Or explore these Learning Paths

Labs

Disabling SSH

AuditLogs

Manual Plugin Installation

Secure Credentials

Limiting The Agent's Access

Safe HTML Rendering

Role-Based Auth Control

Hardening Inbound Connect

No Executors Controller Node

Ready to Elevate Your Security Training?

Empower your teams with the skills they need to secure your applications and stay ahead of the curve.
Get Our Newsletter
Get Started
X
X
Copyright AppSecEngineer © 2023