Certified DevSecOps Expert CDE

The most comprehensive DevSecOps certification in the world

  • Earn the certification by passing the 24-hour practical exam.
  • Certification proves to employers and others the practical understanding of the advanced concepts like custom rule sets.
  • The lab contains all the major components of DevOps pipeline.
  • A CDE is able to write custom rulesets  and reduce false positive fatigue using automation.


  1. Should have Certified DevSecOps Professional (CDP) certification.
  2. Should have basic understanding of Application Security Practices like SAST, DAST, etc.,

Chapter 1: Overview of DevSecOps

  1. What is DevOps?
  2. DevOps Building Blocks- People, Process and Technology.
  3. DevOps Principles – Culture, Automation, Measurement and Sharing (CAMS)
  4. Benefits of DevOps – Speed, Reliability, Availability, Scalability, Automation, Cost and Visibility.
  5. What is Continuous Integration and Continuous Deployment?.
    1. Continuous Integration to Continuous Deployment to Continuous Delivery.
    2. Continuous Delivery vs Continuous Deployment.
    3. General workflow of CI/CD pipeline.
    4. Blue/Green deployment strategy
    5. Achieving full automation.
    6. Designing a CI/CD pipeline for web application.
  6. Common Challenges faced when using DevOps principle.
  7. Case studies on DevOps of cutting edge technology at Facebook, Amazon and Google

Demo: A full enterprise grade DevSecOps Pipeline.

Chapter 2: Overview to the Tools of the trade

  1. Github/Gitlab/BitBucket
  2. Vagrant
  3. Docker
  4. Ansible
  5. Jenkins/Travis/Gitlab CI/Bitbucket
  6. Gauntlt
  7. AWS
  8. Inspec

Chapter 3: Overview of SDLC and CI/CD pipeline

  1. What is Secure SDLC
  2. Secure SDLC Activities and Security Gates
    1. Security Requirements ( Requirements)
    2. Threat Modelling  (Design)
    3. Static Analysis and Secure by Default ( Implementation)
    4. Dynamic Analysis(Testing)
    5. OS Hardening, Web/Application Hardening (Deploy)
    6. Security Monitoring/Compliance (Maintain)
  3. DevSecOps Maturity Model (DSOMM)
  4. Hands-on: Create a CI/CD pipeline suitable for modern application.
  5. Hands-on: Manage the findings in a fully automated pipeline.

Chapter 4: Security Requirements and Threat Modelling (TM)

  1. What is Threat Modelling.
  2. STRIDE vs DREAD approaches
  3. Threat modelling and Its challenges.
  4. Classical Threat modelling tools and how they fit in CI/CD pipeline
  5. Hands-On Labs: Automate security requirements as code.
  6. Hands-On Labs: using ThreatSpec to do Threat Modelling as Code.
  7. Hands-On Labs: using BDD security to codify threats.

Chapter 5: SAST (Static Analysis) in CI/CD pipeline

  1. SWOT analysis of SAST technology
  2. Writing custom rules to weed out false positives and improve quality of the results.
  3. Various approaches to write custom rules in free and paid tools.
    1. Regular expressions
    2. Abstract Syntax Trees
    3. Graphs ( Data and Control Flow analysis)
  4. Hands-On Labs:  Writing custom checks in bandit for your enterprise applications.

Chapter 6: DAST (Dynamic Analysis) in CI/CD pipeline

  1. Dynamic Analysis and Its challenges ( Session Management, AJAX Crawling )
  2. Embedding DAST tools like ZAP and BurpSuite into the pipeline.
  3. Leveraging QA/Performance automation to drive DAST scans.
  4. Using Swagger (OpenAPI) and ZAP to scan APIs iteratively.
  5. Ways to handle custom authentications for ZAP Scanner.
  6. Using Zest Language to provide better coverage for DAST scans.
  7. Hands-On Labs: using ZAP + Selenium + Zest to configure in-depth scans
  8. Hands-On Labs: using Burp Suite Pro to configure per commit/weekly/monthly scans.

Note: The student need to bring their Burp Suite Pro License to use in CI/CD

Chapter 7: Runtime Analysis(RASP/IAST) in CI/CD pipeline

  1. What is Runtime Analysis Application Security Testing?.
  2. Differences between RASP and IAST.
  3. Runtime Analysis and Its challenges.
  4. RASP/IAST and its suitability in CI/CD pipeline.
  5. Hands-On Labs: A commercial implementation of IAST tool.

Chapter 8: Infrastructure as Code and Its Security

  1. What is Infrastructure as Code and its benefits
  2. Introduction to Ansible
    1. Benefits of Ansible
    2. Push and Pull Model
    3. Modules, tasks, roles and Playbooks
    4. Ansible for continuous security in DevOps Pipelines
  3. Introduction to Packer
    1. Benefits of Packer
    2. Modules, tasks, roles and Playbooks
    3. Packer for continuous security in DevOps Pipelines
  4. Tools and Services for practising IaaC ( Packer + Ansible + Docker )
  5. Hands-On Labs: Using Ansible to harden on-prem/cloud machines for PCI-DSS
  6. Hands-On Labs: Create hardened Golden images using Packer + Ansible

Chapter 9: Container (Docker) Security

  1. What is Docker
  2. Docker vs Vagrant
  3. Basics of Docker and its challenges
    1. Vulnerabilities in images (Public and Private)
    2. Denial of service attacks
    3. Privilege escalation methods in Docker.
    4. Security misconfigurations
  4. Container Security
    1. Content Trust and Integrity checks
    2. Capabilities and namespaces in Docker
    3. Segregating Networks
    4. Kernel Hardening using SecComp and AppArmor
  5. Static Analysis of container(Docker) images.
  6. Dynamic Analysis of container hosts and daemons.
  7. Hands-On Labs: Scanning docker images using clair and its APIs
  8. Hands-On Labs: Auditing Docker daemon and host for security issues.

Chapter 10: Secrets management on mutable and immutable infrastructure

  1. Managing secrets in traditional infrastructure.
  2. Managing secrets in containers at Scale.
  3. Secret Management in Cloud
    1. Version Control systems and Secrets.
    2. Environment Variables and Configuration files.
    3. Docker, Immutable systems and its security challenges.
    4. Secrets management with Vault and consul.
  4. Hands-On Labs: Securely store Encryption keys and other secrets using Vault/Consul.

Chapter 11: Patch Management and Security Monitoring

  1. Approaches for patching running applications.
  2. Approaches for patching Immutable Infrastructure.
  3. Hot swap EC2 instances using Ansible.
  4. Security Monitoring using Elasticsearch, Logstash and Kibana.

Chapter 12: Vulnerability Management with custom tools

  1. Approaches to manage the vulnerabilities in the organization.
  2. False positives and False Negatives.
  3. Culture and Vulnerability Management.
  4. Creating different metrics for CXOs, devs and security teams.
  5. Hands-On Labs: Using Defect Dojo for vulnerability management.

Ready to get started?

Get in touch, or Register now!