Certified DevSecOps Leader CDL

The DevSecOps Leader course helps leaders and managers in influencing DevSecOps transformation practices in the enterprise.

In this course, you will be able to:

1. Understand the basics of DevSecOps from the business perspective
2. Assess the DevSecOps Maturity of the organization(PDSOMM)
3. Design the DevSecOps Strategy for an organization(Wardley mapping and Cynefin)
4. Influence organizational’s culture for shift left approach
5. Gain confidence in steering the organization in the right direction
6. Increase the productivity of your team by prioritizing the GRC efforts

This DevSecOps Certification Course is practical in nature with 15+ case studies, hands-on exercises, and demos in our state of the art online labs.

After the training, you can attempt:

1. Earn the Certified DevSecOps Leader certification by passing a 6-hour practical exam.
2. Prove to employers and peers, the strategic understanding of DevSecOps transformation.


  1. The DevSecOps Leader Course has no specific prerequisites.

Chapter 1: DevSecOps Introduction

  1. What is DevSecOps?
  2. Why DevSecOps?
  3. DevSecOps Building Blocks- People, Process, and Technology.
  4. DevSecOps Benefits (Technical and Business benefits).
  5. DevSecOps Principles – Culture, Automation, Measurement, and Sharing (CAMS).
  6. Agile, DevOps, and cloud as a business enabler.
  7. Security in DevOps and Cloud-Native world.
  8. Security archetypes of DevOps
  9. Top 10 myths of DevSecOps

Demo: A full enterprise-grade DevSecOps Pipeline.

Chapter 2: DevSecOps And Strategy

  1. Problems with current business and security strategy.
    1. Good strategy vs Bad Strategy
    2. Archetype model
  2. Designing a DevSecOps strategy for a modern security organisation.
  3. Strategy tooling and frameworks
    1. Wardley Mapping & Strategy cycle
      1. Bonus content: Applying concepts
    2. Wardley mapping summary
    3. Cynefin framework
  4. Managing constraint

Hands-On: Create a map and the 4 problems

Chapter 3: DevSecOps Activities And Culture

  1. Developing culture
    1. Basic assumptions
    2. Values
    3. Artefacts
    4. Typology of culture
  2. Secure SDLC Activities and problems with Security Gates
  3. Security Awareness/Training.
  4. Security Requirements
  5. Threat Modelling (Design)
    1. Hands-on: RTMP review and creation of Threat model
  6. Privacy Requirements ( LINDDUN)
    1. Bonus content: Interview with Kim Wuyts (LINDDUN)
    2. Hands-on: LINDDUN Go Threat modelling
  7. DevSecOps tools and automation
    1. Component security analysis (OAST)
      1. Demo : component Analysis (OAST)
    2. Static Analysis and Secure by Default ( Implementation).
      1. Demo : Static Analysis (SAST)
    3. Dynamic Analysis (Testing).
      1. Demo : Dynamic Analysis (DAST)
    4. OS Hardening, Web/Application Hardening (Deploy).
      1. Demo : Inspec
    5. Security Monitoring/Compliance (Maintain).
      1. Demo : Inspec in CI/CD
    6. Incident Response in DevOps ages
    7. Effective DevOps Incident Management
  8. Critical DevSecOps prerequisites
    1. Cloud Platform.
    2. Shifting Security Left.
    3. Using metrics and measurements to drive the DevSecOps program.

Chapter 4: DevSecOps In Current Security Program

  1. DevSecOps in the current Security program (GRC?)
  2. Governance, Risk, and Compliance (GRC) in DevSecOps World
  3. Change Management in DevOps
    1. A peer-reviewed change approval process
    2. Version control everything
    3. Proactive monitoring
    4. High-trust organizational culture
    5. A win-win relationship between dev and ops (Jez humble)
  4. DevSecOps as a risk management mechanism
  5. Auditing systems the modern way
  6. Compliance in CI/CD pipelines
  7. Compliance as Code
    • Demo: Using Inspec to achieve compliance
    • Demo: Integrate Inspec within CI/CD pipeline

Chapter 5: Security Management And Team Topologies

  1. Security Roles in DevSecOps
  2. Patterns for Team Topologies
  3. Speaking in Stories
  4. Prioritizing security tasks in DevSecOps
  5. Working with other stakeholders in the organization.
  6. Security Champions Program
  • Hands-On: Strategy in a security program
  • Hands-On: Define security activities in organizations
  • Hands-On: Structure with current infosec teams
  • Hands-On: Create epics and related stories
  • Hands-On: Impact from security program gap thinking

Chapter 6: DevSecOps Maturity Model

  1. Maturity levels and tasks involved
  2. 4-axes in DevSecOps Maturity Model (DSOMM)
  3. How to go from Maturity Level 1 to Maturity Level 4
    1. Best practices for Maturity Level 1
    2. Considerations for Maturity Level 2
    3. Challenges in Maturity Level 3
    4. Dream of achieving Maturity Level 4

Chapter 7: Review And Summary

  1. Common Challenges faced when using DevOps principle.
  2. Case studies on DevOps of cutting edge technology at Facebook, Amazon, and Google

Ready to learn DevSecOps?

Get in touch, or Register now!