February 2018
Intermediate to advanced
396 pages
9h 38m
English
This chapter was an overview of the hidden power of CI servers and their benefits for enterprises. Thus, we discovered how to build a CI environment step by step and learned what it takes to secure CI/CD servers. The next chapter will take you on an intensive journey where you will learn how Metasploit and PowerShell are used to attack organization infrastructures.
Read now
Unlock full access