logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Cybersecurity Specialization: DevSecOps

SS Course: GK840102

Course Overview

TOP

DevSecOps is designed to empower you with the knowledge and skills necessary to seamlessly integrate security into your DevOps pipeline. You will gain a deep understanding of DevSecOps principles and practices, ensuring that security is an integral part of your software development lifecycle (SDLC). By mastering continuous security testing methods and tools, you will be equipped to identify and address vulnerabilities early, enhancing the overall security posture of your applications.

Learn the knowledge and tools to ensure continuous security and compliance, safeguarding your software solutions from potential threats.

Our Cybersecurity Specialization courses follow the 9 pillars of Cybersecurity, providing key skills necessary to be successful as a cybersecurity professional.

                                                                  

Scheduled Classes

TOP
12/01/25 - GVT - Virtual Classroom - Virtual Instructor-Led
01/21/26 - GVT - Virtual Classroom - Virtual Instructor-Led
03/09/26 - GVT - Virtual Classroom - Virtual Instructor-Led
04/29/26 - GVT - Virtual Classroom - Virtual Instructor-Led
05/11/26 - GVT - Virtual Classroom - Virtual Instructor-Led
06/29/26 - GVT - Virtual Classroom - Virtual Instructor-Led

Outline

TOP

Overview of DevSecOps

  • DevSecOps principles
  • The DevOps lifecycle and security integration
  • Key challenges in implementing DevSecOps

Security by Design

  • Secure software development lifecycle (SSDLC)
  • Threat modeling and risk assessment
  • Best practices for secure coding
  • Resources: OWASP Top Ten, NIST Cybersecurity Framework

Infrastructure as Code (IaC) Security

  • Introduction to IaC and its benefits
  • Security considerations for IaC
  • Tools to Address : Terraform, Azure Resource Manager (ARM)
  • Resources To be used: Terraform: HashiCorp Terraform, Azure ARM: Azure Documentation

Continuous Integration and Continuous Security

  • Secure CI/CD pipeline design,
    • Implementing Zero Trust in CI/CD Pipelines
    • Incident Response and Recovery in CI/CD Pipelines"
  • Integrating security tools into CI/CD pipelines
    • Implementing Security Gates in CI/CD Pipelines"
  • Tools to Cover: Jenkins, GitHub Actions, Azure DevOps
  • Resources to use: Jenkins: Jenkins Documentation, GitHub Actions: GitHub Actions

Application Security Testing

  • Static Application Security Testing (SAST)
  • Dynamic Application Security Testing (DAST)
  • Tools: SonarQube, OWASP ZAP, Other SAST Tools (Checkmarx, Veracode), Other DAST Tools (Burp Suite, Acunetix)
  • Resources: SonarQube: SonarQube Documentation, OWASP ZAP: OWASP ZAP Documentation

Container Security

  • Securing Docker images and containers
  • Best practices for container security
  • Tools: Docker, Aqua Security. Kubernetes Security
  • Resources: Docker: Docker Documentation, Trivy: Aqua Trivy Documentation

Monitoring and Logging

  • Importance of monitoring and logging in security
  • Tools for monitoring and logging: ELK Stack, Prometheus, Grafana, SIEM (Security Information and Event Management), Grafana for Visualizing Security Metrics
  • Resources: ELK Stack: Elastic Documentation, Prometheus: Prometheus

Incident Response and Forensics

  • Incident response planning and execution
  • Forensic analysis and post-incident review
  • Tools: Splunk, Wireshark, SOAR (Security Orchestration, Automation, and Response), Volatility
  • Resources: Splunk: Splunk Documentation, Wireshark: Wireshark Documentation

Compliance and Governance

  • Understanding security compliance requirements
  • Implementing security policies and governance
  • Standards: GDPR, HIPAA, PCI-DSS, CCPA (California Consumer Privacy Act)
  • Resources: GDPR: EU GDPR Information, HIPAA: HIPAA Journal, PCI-DSS: PCI Security Standards Council

Data Security and Privacy

  • Protecting sensitive data
  • Encryption techniques and key management
  • Tools: Vault by HashiCorp, Azure Key Vault, Google Cloud Key Management Service (KMS), AWS Key Management Service (KMS),
  • Resources: Vault: HashiCorp Vault Documentation, Azure Key Vault: Azure

Capstone Project

    Prerequisites

    TOP
    • Foundational Knowledge of DevOps: Participants should have a basic understanding of DevOps principles and practices.
    • Basic Security Concepts: Familiarity with fundamental cybersecurity concepts is required.
    • Experience with CI/CD Pipelines: Prior experience setting up and using Continuous Integration/Continuous Deployment (CI/CD) pipelines.
    • Scripting Knowledge: Experience writing scripts in languages such as Python, Bash, or PowerShell.
    • Operating System Proficiency: A working, user-level knowledge of Unix/Linux, Mac, or Windows.

      Who Should Attend

      TOP

      This is an intermediate to advanced level course designed for IT professionals, software developers, security engineers, DevOps practitioners, and system administrators who have experience with DevOps and want to integrate security into their development and operational processes.

      This course is ideal for those looking to enhance their skills in secure coding practices, threat modeling, continuous security testing, and implementing security in CI/CD pipelines. Participants should have a foundational understanding of DevOps principles and basic security concepts