- Home
- All Courses
- Cloud Computing Training
- DevOps Training
- DevSecOps Training
Curriculum
- 15 Sections
- 87 Lessons
- 90 Hours
Expand all sectionsCollapse all sections
- Module 1: Introduction to DevSecOps5
- Module 2: Foundations of Software Development and Operations5
- Module 3: Introduction to Cloud Computing5
- Module 4: Cloud Fundamentals and Key Concepts5
- Module 5: Basics of Microsoft Azure Cloud8
- 4.05.1 Introduction to Azure Cloud Platform
- 4.15.2 Core Azure Services: Compute, Storage, Networking
- 4.25.3 Azure Security and Compliance Features
- 4.35.4 Azure Identity and Access Management (IAM)
- 4.45.5 Azure Security Center Overview
- 4.5Lab 5: Creating and Managing Azure Virtual Machines
- 4.6Lab 6: Implementing Azure Role-Based Access Control (RBAC)
- 4.7Lab 7: Monitoring and Securing Azure Resources with Security Center
- Module 6: Basics of Amazon Web Services8
- 5.06.1 Introduction to AWS Cloud Platform
- 5.16.2 Core AWS Services: EC2, S3, RDS, VPC
- 5.26.3 AWS Security and Compliance Features
- 5.36.4 AWS Identity and Access Management (IAM)
- 5.46.5 AWS Security Hub Overview
- 5.5Lab 8: Launching and Managing AWS EC2 Instances
- 5.6Lab 9: Configuring S3 Bucket Policies and Permissions
- 5.7Lab 10: Using AWS IAM for Access Management
- Module 7: Introduction to Security in Software Development5
- Module 8: Core DevSecOps Practices and Tools14
- 7.08.1 Integrating Security into the CI/CD Pipeline
- 7.18.2 Introduction to Security Testing Tools
- 7.28.2.1 Static Application Security Testing (SAST)
- 7.38.2.2 Dynamic Application Security Testing (DAST)
- 7.48.2.3 Software Composition Analysis (SCA)
- 7.58.3 Container Security Best Practices
- 7.68.3.1 Docker Security Basics
- 7.78.3.2 Kubernetes Security
- 7.88.4 Infrastructure as Code (IaC) Security
- 7.98.4.1 Introduction to IaC
- 7.108.4.2 Securing IaC Templates
- 7.11Lab 12: Integrating SAST and DAST in CI/CD Pipelines
- 7.12Lab 13: Securing Docker Containers and Images
- 7.13Lab 14: Implementing Secure IaC with Terraform
- Module 9: Security Automation and Monitoring6
- 8.09.1 Automating Security Testing in CI/CD
- 8.19.2 Continuous Monitoring and Incident Response
- 8.29.3 Introduction to Security Information and Event Management (SIEM)
- 8.39.4 Implementing Logging and Monitoring for Security
- 8.4Lab 15: Setting Up Automated Security Scans
- 8.5Lab 16: Configuring SIEM for Security Monitoring
- Module 10: Secure Coding Practices6
- Module 11: Compliance and Governance in DevSecOps5
- Module 12: Case Studies and Real-World Examples3
- Module 13: Hands-On Labs and Exercises5
- Module 14: Capstone Project4
- Module 15: Conclusion3
16.2 Career Opportunities in DevSecOps
Prev