You are on page 1of 1

This course explains how DevOps security practices differ from other security approaches and provides the

education needed to understand and apply data and security sciences. Participants learn the purpose, benefits,
concepts, and vocabulary of DevSecOps; particularly how DevSecOps roles fit with a DevOps culture and
organisation. At the end of this course, participants will understand using “security as code” with the intent of
making security and compliance consumable as a service.

The course is designed to teach practical steps on how to integrate security programs into DevOps practices and highlights how
professionals can use data and security science as the primary means of protecting the organisation and customer. Using real-life
scenarios and case studies, participants will have tangible takeaways to leverage when back at the office.

The DevSecOps course is designed for: The objectives for DevSecOps include an understanding of:

• Those involved or interested in learning about DevSecOps • The purpose, benefits, concepts, and vocabulary
strategies and automation • How DevOps security practices differ from other security
• Those involved in Continuous Delivery toolchain architectures approaches
• Compliance Team, Delivery Staff. DevOps Engineers • Business-driven security strategies
• IT Security Professionals, Practitioners, and Managers • Understanding and applying data and security sciences
• Maintenance and support staff, Managed Service Providers • The use and benefits of Red and Blue Teams
• Project & Product Managers, Quality Assurance Teams, • Integrating security into Continuous Delivery workflows
Release Managers, Software Engineers, Testers • How DevSecOps roles fit with a DevOps culture and
• Scrum Masters, Site Reliability Engineers organisation

• Risk Management in a High-velocity • Leveraging Automation


1. Course Introduction
World
• Course Goals 8. Operational Security
• Exercise: Measuring For Success
• Course Agenda • Basic Security Hygiene Practices
• Exercise: Diagramming Your CI/CD 5. General Security Considerations • Role of Operations Management
Pipeline • Avoiding the Checkbox Trap • The Ops Environment
• Basic Security Hygiene • Exercise: Adding Security to Your CI/CD
2. Why DevSecOps?
• Architectural Considerations Pipeline
• Key Terms and Concepts • Federated Identity
• 9. GRG & Audit
Why DevSecOps is important • Log Management
• 3 Ways to Think About DevOps+Security • What is GRC?
• Key Principles of DevSecOps 6. IAM: Identity & Access Mgmt • Why Care About GRC?
• IAM Basic Concepts • Rethinking Policies | Policy as Code
3. Culture & Management
• Why IAM is Important • Shifting Audit Left
• Incentive Model • Implementation Guidance • 3 Myths of Segregation of Duties vs.
• Resilience • Automation Opportunities DevOps
• Organisational Culture • How to Hurt Yourself with IAM • Exercise: Making Policies, Audit and
• Generativity • Exercise: Overcoming IAM Challenges Compliance Work with DevOps
• Erickson, Westrum, and LaLoux
• Exercise: Influencing Culture 7. Application Security 10. Logging, Monitoring & Response
• Application Security Testing (AST) • Setting Up Log Management
4. Strategic Considerations • Incident Response and Forensics
• Testing Techniques
• How Much Security is Enough? • Prioritising Testing Techniques • Threat Intelligence and Information
• Threat Modeling • Issue Management Integration Sharing
• Context is Everything • Threat Modeling

www.alc-group.com ALC is accredited by the DevOps Institute to delivery DevSecOps training.

You might also like