Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to DevSecOps and ECDE Framework
- DevSecOps fundamentals and principles
- Security challenges in DevOps environments
- Overview of the ECDE exam and domains
Secure DevOps Culture and Mindset
- Security as a shared responsibility
- Shifting security left in the SDLC
- Stakeholder alignment and team roles
Integrating Security in CI/CD Pipelines
- Securing Jenkins, GitLab CI, and Azure DevOps pipelines
- Secrets management and environment configuration
- Secure container builds and image scanning
Application Security in DevSecOps
- Static and dynamic application security testing (SAST/DAST)
- Open-source dependency scanning (SCA tools)
- Secure code review and coding practices
Infrastructure as Code and Cloud Security
- Securing Terraform, Ansible, and Kubernetes configurations
- IAM and policy-as-code
- DevSecOps in hybrid/multi-cloud environments
Monitoring, Compliance, and Incident Readiness
- Security monitoring and logging in CI/CD
- Compliance automation (e.g., NIST, ISO, SOC 2)
- Automated remediation and incident response workflows
ECDE Exam Preparation and Final Lab
- ECDE exam structure and preparation tips
- Capstone DevSecOps pipeline lab
- Knowledge checks and readiness assessment
Summary and Next Steps
Requirements
- Understanding of basic DevOps workflows and tools
- Familiarity with software development lifecycle (SDLC)
- Knowledge of application security principles is helpful
Audience
- DevOps engineers
- Application security professionals
- Software developers integrating security into pipelines
28 Hours
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
Very good to understand how a hacker would potentially analyse sites for weakness and tools they might employ .