DevSecOps

The DevSecOps training course is designed to introduce security practices earlier in the life cycle of application development — minimizing vulnerabilities and bridging security and business objectives. This course discusses threats and examines threat detection. Students will explore penetration testing and the tools used for penetration testing. The course will discuss monitoring and automating security ops. The DevSecOps course is focused on the Azure cloud, however, this can be customized to Google Cloud, AWS or other technologies.

Course Summary

Purpose: 
Describe the philosophy, models, goals, practices and tools being used to move to a DevSecOps culture.
Audience: 
Developers and developer teams looking to incorporate the philosophy, models, goals, practices and tools of DevSecOps into their development workflows.
Skill Level: 
Learning Style: 

Hands-on training is customized, instructor-led training with an in-depth presentation of a technology and its concepts, featuring such topics as Java, OOAD, and Open Source.

Hands On help

Seminars are highly-focused, lecture-heavy, half-day to multi-day learning events. Seminars are a great way to create an awareness level of knowledge for a large number of concepts, in a short period of time. Think wide (breadth) and thin (depth).

Seminar help

Workshops are instructor-led lab-intensives focused on the practical application of technologies through the facilitation of a project-related lab. Workshops are just the opposite of Seminars. They deliver the highest level of knowledge transfer of any format. Think wide (breadth) and deep (depth).

Workshop help
Duration: 
2 Days
Productivity Objectives: 
  • Define DevSecOps – what it is, it’s goals and how to avoid failures
  • Discuss the DevSecOps lifecycle
  • Identify tools and programs that can be used to implement and work within a DevSecOps practice

What You'll Learn

In the DevSecOps training course you’ll learn:

  • What is DevSecOps
    • History
    • Business Impact
  • Thinking Like a Hacker
    • Becoming a white hat
  • Application Threats vs Infrastructure Threats
    • Implications in the cloud
  • Threat Maps
    • Creating an attack map
  • Detecting threats upstream
    • OWASP
    • The OWASP top 10
  • Penetration Testing
    • What is it?
    • How do you perform a test?
  • PEN Testing Tools
    • Metasploit
    • ZAP
  • Monitoring using Azure Monitoring
  • Automation
    • Automation in the Dev Pipeline
    • Hooking prevention into the Dev Pipeline
    • Integrating PEN testing tools into a Jenkins pipeline

Get Custom Training Quote

We'll work with you to design a custom DevSecOps training program that meets your specific needs. A 100% guaranteed plan that works for you, your team, and your budget.

Learn More

Chat with one of our Program Managers from our Boulder, Colorado office to discuss various training options.

DevelopIntelligence has been in the technical/software development learning and training industry for nearly 20 years. We’ve provided learning solutions to more than 48,000 engineers, across 220 organizations worldwide.

About Develop Intelligence
Di Clients
Need help finding the right learning solution?   Call us: 877-629-5631