Certified DevSecOps Professional (CDP)
The hands-on DevSecOps Certification Course

The DevSecOps Professional course is our most sought-after DevSecOps Training and Certification program.

In this DevSecOps certification course, you will learn:

  • DevSecOps processes, tools, and techniques.
  • Major components in a DevOps Pipeline.
  • How to create and maintain DevSecOps pipelines using SCA, SAST, DAST, and Security as Code.
  • How to mature an organization’s DevSecOps Program.
  • Learn to understand and apply the principles, values, and practices that enable DevSecOps:

This DevSecOps Training and Certification Course is practical in nature with 100+ guided hands-on exercises in our state of the art online labs.

Load iframe content

Top Rated Course

Check Out Reviews

  • Self-paced Learning Mode
  • Browser-based Lab Access
  • 24/7 Instructor Support via Mattermost

DevSecOps Certification Prerequisites

  1. Course participants should have knowledge of running basic linux commands like ls, cd, mkdir etc.,
  2. Course participants should have basic understanding of application Security practices like OWASP Top 10.
  3. You don’t need any experience with DevOps or DevOps tools.

Chapter 1: An Introduction to the Basics

  1. What is DevOps?
  2. DevOps Building Blocks- People, Process and Technology.
  3. DevOps Principles – Culture, Automation, Measurement and Sharing (CAMS)
  4. Benefits of DevOps – Speed, Reliability, Availability, Scalability, Automation, Cost and Visibility.
  5. What is Continuous Integration and Continuous Deployment?.
    1. Continuous Integration to Continuous Deployment to Continuous Delivery.
    2. Continuous Delivery vs Continuous Deployment.
    3. General workflow of CI/CD pipeline.
    4. Blue/Green deployment strategy
    5. Achieving full automation.
    6. Designing a CI/CD pipeline for web application.
  6. Common Challenges faced when using DevOps principle.
  7. Case studies on DevOps of cutting edge technology at Facebook, Amazon and Google

Demo: A full enterprise grade DevSecOps Pipeline.

Chapter 2: Introduction to the Tools of the trade

  1. Gitlab/Github
  2. Docker
  3. Gitlab CI/Github Actions/Circle CI/Jenkins/Travis/
  5. Ansible
  6. Inspec
  7. Hands-On Labs: Building a CI Pipeline using  Gitlab CI/Jenkins/Travis and Gitlab/Github Actions.
  8. Hands-On Labs: Use the above tools to create a complete CI/CD pipeline.

Note: Once you learn the above tools, you will be able to create DevSecOps Pipelines in Cloud providers like AWS, Azure DevOps etc.,

Chapter 3: Secure SDLC and CI/CD pipeline

  1. What is Secure SDLC
  2. Secure SDLC Activities and Security Gates
    1. Security Requirements ( Requirements)
    2. Threat Modelling  (Design)
    3. Static Analysis and Secure by Default ( Implementation)
    4. Dynamic Analysis(Testing)
    5. OS Hardening, Web/Application Hardening (Deploy)
    6. Security Monitoring/Compliance (Maintain)
  3. DevSecOps Maturity Model (DSOMM)
    1. Maturity levels and tasks involved
    2. 4-axes in DSOMM
    3. How to go from Maturity Level 1 to Maturity Level 4
    4. Best practices for Maturity Level 1
    5. Considerations for Maturity Level 2
    6. Challenges in Maturity Level 3
    7. Dream of achieving Maturity Level 2
  4. Usings tools of the trade to do the above activities in CI/CD
  5. Embedding Security as part of CI/CD pipeline
  6. DevSecOps and challenges with Pentesting and Vulnerability Assessment.
  7. Hands-on: Create a CI/CD pipeline suitable for modern application.
  8. Hands-on: Manage the findings in a fully automated pipeline.

Real Professionals, Real Impact and Real Results

  • Lucas Testimonial
  • Jason Testimonials
  • Toumas Testimonial
  • Des Penny
  • Christos

Chapter 4: Software Component Analysis (SCA) in CI/CD pipeline

  1. What is Software Component Analysis.
  2. Software Component Analysis and Its challenges.
  3. What to look in a SCA solution (Free or Commercial).
  4. Embedding SCA tools like OWASP Dependency Checker, Safety, RetireJs and NPM Audit, Snyk into the pipeline.
  5. Demo: using OWASP Dependency Checker to scan third party component vulnerabilities in Java Code Base.
  6. Hands-On Labs: using RetireJS and NPM to scan third party component vulnerabilities in Javascript Code Base.
  7. Hands-On Labs: using Safety/pip to scan third party component vulnerabilities in Python Code Base.

Chapter 5: SAST (Static Analysis) in CI/CD pipeline

  1. What is Static Application Security Testing.
  2. Static Analysis and Its challenges.
  3. Embedding SAST tools like Find Bugs into the pipeline.
  4. Secrets scanning to prevent secret exposure in the code.
  5. Writing custom checks to catch secrets leak age in an organization.
  6. Hands-On Labs:
    1. using SpotBugs to scan Java code.
    2. using trufflehog/gitrob to scan for secrets in CI/CD pipeline.
    3. using brakeman/bandit to scan Ruby on Rails and Python Code Base.

Chapter 6: DAST (Dynamic Analysis) in CI/CD pipeline

  1. What is Dynamic Application Security Testing.
  2. Dynamic Analysis and Its challenges ( Session Management, AJAX Crawling )
  3. Embedding DAST tools like ZAP and Burp Suite Dastardly into the pipeline.
  4. SSL misconfiguration testing
  5. Server Misconfiguration Testing like secret folders and files.
  6. Creating baseline scans for DAST.
  7. Hands-On Labs: using ZAP to configure per commit/weekly/monthly scans.

Chapter 7: Infrastructure as Code and Its Security

  1. What is Infrastructure as Code and its benefits.
  2. Platform + Infrastructure Definition + Configuration Management.
  3. Introduction to Ansible.
    1. Benefits of Ansible.
    2. Push and Pull based configuration management systems
    3. Modules, tasks, roles and Playbooks
  4. Tools and Services which helps to achieve IaaC
  5. Hands-On Labs: Docker and Ansible
  6. Hands-On Labs: Using Ansible to create Golden images and harden Infrastructure.

Chapter 8: Compliance as code

  1. Different approaches to handle compliance requirements at DevOps scale
  2. Using configuration management to achieve compliance.
  3. Manage compliance using Inspec/OpenScap at Scale.
  4. Hands-On Labs: Create a Inspec profile to create compliance checks for your organization
  5. Hands-On Labs: Use Inspec profile to scale compliance.

Chapter 9: Vulnerability Management with custom tools

  1. Approaches to manage the vulnerabilities in the organization.
  2. Hands-On Labs: Using Defect Dojo for vulnerability management.

Practical DevSecOps Certification Process

  1. After completing the course schedule the exam on your prefered date.
  2. Pass the exam to get Certified DevSecOps Professional Certification.
  3. Process of achieving practical devsecops course certifications can be found on the exam and certification page.