People love talking about 'Shift security left', but they rarely make the effort to implement it. How do you efficiently integrate security into DevOps so it doesn't turn into a bottleneck later on?
That's where DevSecOps comes in.
From CI/CD pipelines to security automation, DevSecOps is all about boosting your security posture while maintaining rapid build times. Why choose between efficiency and security when you can have both?
This training is a comprehensive, focused, and practical approach at implementing Security for your Continuous Delivery Pipeline. The training is backed by a ton of hands-on labs, original research, and real-world implementations of DevSecOps that work.The training begins with a detailed view of Continuous Application Security, through Application Security Automation with SAST, DAST, SCA, IAST and RASP. We will focus on real-world tools and techniques to automate application security tooling in a CI/CD pipeline. In addition, there will be a deep dive of several popular Test Automation Frameworks that can be leveraged extensively to parameterize application security tests with test automation scripts. All this expertise will go into actually “building” security pipelines that can be integrated into the organization’s DevOps processes.
Upskill all your teams — Security, Ops, Developers, Cloud — in security automation & pipelines.
Customize scans and CI/CD workflows using easy-to-read scripts and plugins.
Manage your software supply chains & discover insecure components before they become a problem.
Test & deploy Docker containers securely at any scale.
How to build custom CI/CD and security automation pipelines
How to leverage DAST, SAST & SCA for continuous delivery
Agile Threat Modeling and automation to create 'Threat Models as Code
Creating custom scripts for automated vulnerability assessments
Crafted on Real-world training for product security teams
Hands-on Experience: Engage with real-world scenarios in a controlled, cloud-based lab environment to apply learning directly.
Immediate Application: Implement Threat Modeling tools and techniques instantly, enhancing retention and understanding.
Access to Specialized Tooling: Utilize advanced Threat Modeling software and LLMs without needing to set up or maintain the infrastructure.
Safe Learning Space: Experiment and learn from mistakes in a risk-free sandbox, encouraging exploration and innovation.
Basic understanding of application security principles.
Familiarity with software development and the software development lifecycle (SDLC).
Some experience in security practices and methodologies is beneficial
For the optimal learning experience in this course, participants should use a laptop with Windows 10/11, the latest macOS, or a modern Linux distribution, equipped with an Intel i5 processor or equivalent (i7 recommended), at least 8GB of RAM (16GB preferred), and 20GB of free disk space. A stable, high-speed internet connection is essential for accessing streaming content and cloud-based labs, alongside the latest versions of Google Chrome, Mozilla Firefox, or Safari with JavaScript enabled. Participants must have administrative rights to install necessary software and a modern code editor like Visual Studio Code.
10