Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Application Security with Snyk

( Duration: 2 Days )

Security is one of the major pillars of your application, without this pillar, the chances of your application crumbling are high. The reason to focus more on security right from the earliest stages is simple: in order to stay secure, you need to get security right every time. However, attackers on the other hand need to get an attack right only once to succeed. This Application Security with Snyk training course helps you become familiar with Snyk so you can learn to use it to meet your security needs.

By attending Application Security with Snyk workshop, delegates will learn to:

  • Install Snyk CLI using npm, Homebrew, or Scoop
  • Run the vulnerability checks
  • Fix vulnerabilities with high severity by creating manual pull/merge requests
  • Run analysis on code using Snyk's JetBrains IDE plugin
  • Use Snyk container CLI to test Docker container images
  • Scan Kubernetes configuration files, and fix the security issues
  • Create a high-severity license policy by adding severity, description, and instructions
  • Configure Snyk notifications to send regular reports

The Application Security with Snyk class is ideal for:

  • Cybersecurity Specialists
  • IT Security Specialists
  • Data Security Specialists
  • System Analysts/Admins
  • Developers and Engineers Looking to Specialize in Synk

COURSE AGENDA

1

Introduction to Snyk

  • What is Snyk?
  • How does Snyk work?
  • Snyk features
    • Integrations
    • Snyk CLI
    • Snyk API
    • License compliance management
    • Snyk intel vulnerability database
    • Fixing and prioritizing issues
    • Reporting
  • Programming languages that Snyk supports
  • Introduction to Snyk products
    • Snyk open source
    • Snyk code
    • Snyk container
    • Infrastructure as code
2

Snyk Open Source

  • Which source code management systems does Snyk support?
    • GitHub
    • Bitbucket
    • GitLab
    • Azure Repos
  • How do automatic pull/merge requests work for the vulnerability fix?
3

Snyk Code

  • Snyk Code and the developer-first approach
  • Snyk Code AI engine
  • Features of Snyk Code:
    • Accurate code flaw detection
    • Secret information detection in code
    • Code flow visualization
    • Provides information about security issues, their background, and how to approach them
4

Snyk Container

  • What security do containers provide?
    • Decreases attack surface
    • Isolates applications
    • Makes security patching easier, with less disruption
  • Security risks with containers
    • Privilege escalation
    • Risk of using insecure images
    • Kernel or memory threats induced by code
  • Introducing Snyk container
    • Snyk container detection: Snyk scans images to find operating system packages, unmanaged software, and application packages based on manifest file
    • Supported operating systems: Debian, Ubuntu, CentOS, Red Hat Enterprise Linux (including UBI), Amazon Linux 2, SUSE Linux Enterprise Server, Alpine
    • Recurring scans
5

Snyk Infrastructure as Code (IaC)

6

Snyk License Compliance Management and Vulnerability Database

  • What is Snyk license compliance management?
  • Access and understand the information in Snyk's intel vulnerability database.
7

Administration

  • Manage groups and organizations in Snyk: Create groups and switch between groups and organizations.

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X