DevSecOps for Practitioners Course | Coveros Training

DevSecOps for Practitioners

Build security into your DevOps process

Explore security testing within a DevSecOps pipeline in an informal and interactive workshop setting. Attendees will gain practical experience through both group discussions and hands-on exercises.

Upcoming Classes

Dates
Mode
Location
Event
Venue
Call to Schedule
Anytime
Virtual Classroom
Your Location
Anywhere
Select a learning mode button (Public, Live Virtual, etc.) for pricing, details, and a downloadable fact sheet.
Description
  • Learn how to build security into your DevOps process
  • Learn how to use security requirements to plan your testing efforts
  • Explore key aspects of security testing – web security, threat modeling, risk assessment
  • Learn how security testing can be effectively leveraged within a DevOps pipeline
  • Understand how DevSecOps builds upon DevOps practices
  • Understand how technical and automation skills can be leveraged in your DevSecOps efforts
  • Develop practical experience through the completion of hands-on exercises

Your organization has started moving toward a DevOps way of thinking and working, and you have started to set up a delivery pipeline. However, you realize that security testing is missing from your pipeline, and you know that testing for security early and often is an important part of ensuring that your system is free from vulnerabilities.

If you are looking for a way to include security testing in your pipeline and turn your DevOps practice into a DevSecOps practice, then this course is for you. You will learn how DevSecOps builds upon the principles and practices of DevOps and how to integrate security testing tools into the various stages of the pipeline. This course will give you hands-on practice with configuring and using these tools so that you will be prepared to introduce DevSecOps to your own organization.

Who Should Attend?
This course is appropriate for software professionals who are involved with development, testing, security, and operations and who want to incorporate security testing into their organization’s pipeline. Because this course has a heavy focus on hands-on exercises, it is most appropriate for practitioners and will not be tailored toward management or leadership.

Questions? 929.777.8102 [email protected]
Course Outline
DevOps Refresher
Description
Purpose
Goals
Dev vs. Ops
DevOps Principles
 
Security Refresher
Definition of Information Security
History of Information Security
CIA++
State of Application Security
 
DevSecOps Overview
Definition
Relevant Terms
Purpose
Benefits and Drawbacks
Tool Types
 
Risk Assessment
Importance of Software Security
Understanding Risk
Risk Assessment Exercise
 
Threat Modeling
Microsoft STRIDE
Architectural and Design Reviews
Threat Modeling Exercise
 
Software Composition Analysis (SCA)
Description
Motivation
Tools
SCA Exercise
 
Static Application Security Testing (SAST)
What It Is
Why We Need It
Goals
Pros and Cons
Tools
SAST Exercise
 
Dynamic Application Security Testing (DAST)
What It Is
Goals
How DAST Tools Work
Pros and Cons
Tools
DAST Exercise

 

Log Management
Description
Motivation
Tools
Log Management Exercise
 
Monitoring
Description
Motivation
Tools
Monitoring Exercise
 
Security Information and Event Management (SIEM)
Description
Motivation
Tools
SIEM Exercise
 
Intrusion Detection Systems (IDS)
Description
Motivation
Tools
IDS Exercise
 
Security Requirements Testing
Functional vs. Non-functional Requirements
Misuse and Abuse Cases
Testing Security Requirements
Security Requirements Exercise
 
Advanced Techniques: IAST, RASP, and HAST
What They Are
Goals
How These Tools Work
Pros and Cons
Tools
 
Penetration Testing
What It Is
When It Should be Performed
How It Works
Enumeration and Footprint Analysis
Tool Categories
Pen Testing Exercise
 

Don't see a date that fits your schedule? Contact us for scheduling options at 929.777.8102


Course Duration: 2 Days
Ways to Save

Groups Save Up to 20%

Have a group and want to save more? Groups always save with Coveros Training! Groups of 3–5 save 10% on Public and Live Virtual training, and groups of 6 or more save 20%. Group discounts are automatically applied when registering multiple attendees with the same initial path. For groups choosing a mix of classes, contact our Client Support Group at 929.777.8102 or email [email protected].

Description
  • Learn how to build security into your DevOps process
  • Learn how to use security requirements to plan your testing efforts
  • Explore key aspects of security testing – web security, threat modeling, risk assessment
  • Learn how security testing can be effectively leveraged within a DevOps pipeline
  • Understand how DevSecOps builds upon DevOps practices
  • Understand how technical and automation skills can be leveraged in your DevSecOps efforts
  • Develop practical experience through the completion of hands-on exercises

Your organization has started moving toward a DevOps way of thinking and working, and you have started to set up a delivery pipeline. However, you realize that security testing is missing from your pipeline, and you know that testing for security early and often is an important part of ensuring that your system is free from vulnerabilities.

If you are looking for a way to include security testing in your pipeline and turn your DevOps practice into a DevSecOps practice, then this course is for you. You will learn how DevSecOps builds upon the principles and practices of DevOps and how to integrate security testing tools into the various stages of the pipeline. This course will give you hands-on practice with configuring and using these tools so that you will be prepared to introduce DevSecOps to your own organization.

Who Should Attend?
This course is appropriate for software professionals who are involved with development, testing, security, and operations and who want to incorporate security testing into their organization’s pipeline. Because this course has a heavy focus on hands-on exercises, it is most appropriate for practitioners and will not be tailored toward management or leadership.

Questions? 929.777.8102 [email protected]
Course Outline
DevOps Refresher
Description
Purpose
Goals
Dev vs. Ops
DevOps Principles
 
Security Refresher
Definition of Information Security
History of Information Security
CIA++
State of Application Security
 
DevSecOps Overview
Definition
Relevant Terms
Purpose
Benefits and Drawbacks
Tool Types
 
Risk Assessment
Importance of Software Security
Understanding Risk
Risk Assessment Exercise
 
Threat Modeling
Microsoft STRIDE
Architectural and Design Reviews
Threat Modeling Exercise
 
Software Composition Analysis (SCA)
Description
Motivation
Tools
SCA Exercise
 
Static Application Security Testing (SAST)
What It Is
Why We Need It
Goals
Pros and Cons
Tools
SAST Exercise
 
Dynamic Application Security Testing (DAST)
What It Is
Goals
How DAST Tools Work
Pros and Cons
Tools
DAST Exercise

 

Log Management
Description
Motivation
Tools
Log Management Exercise
 
Monitoring
Description
Motivation
Tools
Monitoring Exercise
 
Security Information and Event Management (SIEM)
Description
Motivation
Tools
SIEM Exercise
 
Intrusion Detection Systems (IDS)
Description
Motivation
Tools
IDS Exercise
 
Security Requirements Testing
Functional vs. Non-functional Requirements
Misuse and Abuse Cases
Testing Security Requirements
Security Requirements Exercise
 
Advanced Techniques: IAST, RASP, and HAST
What They Are
Goals
How These Tools Work
Pros and Cons
Tools
 
Penetration Testing
What It Is
When It Should be Performed
How It Works
Enumeration and Footprint Analysis
Tool Categories
Pen Testing Exercise
 
Class Schedule
Sign-In/Registration 7:30 - 8:30 a.m.
Morning Session 8:30 a.m. - 12:00 p.m.
Lunch 12:00 - 1:00 p.m.
Afternoon Session 1:00 - 5:00 p.m.
Times represent the typical daily schedule. Please confirm your schedule at registration.
 
Class Fee Includes
• Tuition
• Course notebook
• Continental breakfasts and refreshment breaks
• Lunches
• Letter of completion
Instructors

Don't see a date that fits your schedule? Contact us for scheduling options at 929.777.8102


Course Duration: 3 Days
Ways to Save

Refer a Colleague

Get a $100 gift card for each Live Virtual registration you refer. Learn more about the Coveros Referral Program and how you can earn up to $500 in gift cards. 

Description
  • Learn how to build security into your DevOps process
  • Learn how to use security requirements to plan your testing efforts
  • Explore key aspects of security testing – web security, threat modeling, risk assessment
  • Learn how security testing can be effectively leveraged within a DevOps pipeline
  • Understand how DevSecOps builds upon DevOps practices
  • Understand how technical and automation skills can be leveraged in your DevSecOps efforts
  • Develop practical experience through the completion of hands-on exercises

Your organization has started moving toward a DevOps way of thinking and working, and you have started to set up a delivery pipeline. However, you realize that security testing is missing from your pipeline, and you know that testing for security early and often is an important part of ensuring that your system is free from vulnerabilities.

If you are looking for a way to include security testing in your pipeline and turn your DevOps practice into a DevSecOps practice, then this course is for you. You will learn how DevSecOps builds upon the principles and practices of DevOps and how to integrate security testing tools into the various stages of the pipeline. This course will give you hands-on practice with configuring and using these tools so that you will be prepared to introduce DevSecOps to your own organization.

Who Should Attend?
This course is appropriate for software professionals who are involved with development, testing, security, and operations and who want to incorporate security testing into their organization’s pipeline. Because this course has a heavy focus on hands-on exercises, it is most appropriate for practitioners and will not be tailored toward management or leadership.

Questions? 929.777.8102 [email protected]
Course Outline
DevOps Refresher
Description
Purpose
Goals
Dev vs. Ops
DevOps Principles
 
Security Refresher
Definition of Information Security
History of Information Security
CIA++
State of Application Security
 
DevSecOps Overview
Definition
Relevant Terms
Purpose
Benefits and Drawbacks
Tool Types
 
Risk Assessment
Importance of Software Security
Understanding Risk
Risk Assessment Exercise
 
Threat Modeling
Microsoft STRIDE
Architectural and Design Reviews
Threat Modeling Exercise
 
Software Composition Analysis (SCA)
Description
Motivation
Tools
SCA Exercise
 
Static Application Security Testing (SAST)
What It Is
Why We Need It
Goals
Pros and Cons
Tools
SAST Exercise
 
Dynamic Application Security Testing (DAST)
What It Is
Goals
How DAST Tools Work
Pros and Cons
Tools
DAST Exercise

 

Log Management
Description
Motivation
Tools
Log Management Exercise
 
Monitoring
Description
Motivation
Tools
Monitoring Exercise
 
Security Information and Event Management (SIEM)
Description
Motivation
Tools
SIEM Exercise
 
Intrusion Detection Systems (IDS)
Description
Motivation
Tools
IDS Exercise
 
Security Requirements Testing
Functional vs. Non-functional Requirements
Misuse and Abuse Cases
Testing Security Requirements
Security Requirements Exercise
 
Advanced Techniques: IAST, RASP, and HAST
What They Are
Goals
How These Tools Work
Pros and Cons
Tools
 
Penetration Testing
What It Is
When It Should be Performed
How It Works
Enumeration and Footprint Analysis
Tool Categories
Pen Testing Exercise
 
Class Schedule
Day 1: 12:30pm-4:30pm ET/9:30am-1:30pm PT
Day 2: 12:30pm-4:30pm ET/9:30am-1:30pm PT
Day 3: 12:30pm-4:30pm ET/9:30am-1:30pm PT
Class Fee Includes
  • Easy course access: Attend training right from your computer and easily connect your audio via computer or phone. Easy and quick access fits today’s working style and eliminates expensive travel and long days in the classroom.
  • Live, expert instruction: Instructors are sought-after practitioners, highly-experienced in the industry who deliver a professional learning experience in real-time.
  • Valuable course materials: Courses cover the same professional content as our classroom training, and students have direct access to valuable materials.
  • Rich virtual learning environment: A variety of tools are built in to the learning platform to engage learners through dynamic delivery and to facilitate a multi-directional flow of information.
  • Hands-on exercises: An essential component to any learning experience is applying what you have learned. Using the latest technology, your instructor can provide hands-on exercises, group activities, and breakout sessions.
  • Real-time communication: Communicate real-time directly with the instructor. Ask questions, provide comments, and participate in the class discussions.
  • Peer interaction: Networking with peers has always been a valuable part of any classroom training. Live Virtual training gives you the opportunity to interact with and learn from the other attendees during breakout sessions, course lecture, and Q&A.
  • Convenient schedule: Course instruction is divided into modules no longer than four hours per day. This schedule makes it easy to get the training you need without taking days out of the office and setting aside projects.
  • Small class size: Live Virtual courses are limited in small class size to ensure an opportunity for personal interaction.
Instructors
Dates
Mode
Location
Event
Venue
Call to Schedule
Anytime
Virtual Classroom
Your Location
Anywhere
Course Duration: 2 Days
Description
  • Learn how to build security into your DevOps process
  • Learn how to use security requirements to plan your testing efforts
  • Explore key aspects of security testing – web security, threat modeling, risk assessment
  • Learn how security testing can be effectively leveraged within a DevOps pipeline
  • Understand how DevSecOps builds upon DevOps practices
  • Understand how technical and automation skills can be leveraged in your DevSecOps efforts
  • Develop practical experience through the completion of hands-on exercises

Your organization has started moving toward a DevOps way of thinking and working, and you have started to set up a delivery pipeline. However, you realize that security testing is missing from your pipeline, and you know that testing for security early and often is an important part of ensuring that your system is free from vulnerabilities.

If you are looking for a way to include security testing in your pipeline and turn your DevOps practice into a DevSecOps practice, then this course is for you. You will learn how DevSecOps builds upon the principles and practices of DevOps and how to integrate security testing tools into the various stages of the pipeline. This course will give you hands-on practice with configuring and using these tools so that you will be prepared to introduce DevSecOps to your own organization.

Who Should Attend?
This course is appropriate for software professionals who are involved with development, testing, security, and operations and who want to incorporate security testing into their organization’s pipeline. Because this course has a heavy focus on hands-on exercises, it is most appropriate for practitioners and will not be tailored toward management or leadership.

Questions? 929.777.8102 [email protected]
Course Outline
DevOps Refresher
Description
Purpose
Goals
Dev vs. Ops
DevOps Principles
 
Security Refresher
Definition of Information Security
History of Information Security
CIA++
State of Application Security
 
DevSecOps Overview
Definition
Relevant Terms
Purpose
Benefits and Drawbacks
Tool Types
 
Risk Assessment
Importance of Software Security
Understanding Risk
Risk Assessment Exercise
 
Threat Modeling
Microsoft STRIDE
Architectural and Design Reviews
Threat Modeling Exercise
 
Software Composition Analysis (SCA)
Description
Motivation
Tools
SCA Exercise
 
Static Application Security Testing (SAST)
What It Is
Why We Need It
Goals
Pros and Cons
Tools
SAST Exercise
 
Dynamic Application Security Testing (DAST)
What It Is
Goals
How DAST Tools Work
Pros and Cons
Tools
DAST Exercise

 

Log Management
Description
Motivation
Tools
Log Management Exercise
 
Monitoring
Description
Motivation
Tools
Monitoring Exercise
 
Security Information and Event Management (SIEM)
Description
Motivation
Tools
SIEM Exercise
 
Intrusion Detection Systems (IDS)
Description
Motivation
Tools
IDS Exercise
 
Security Requirements Testing
Functional vs. Non-functional Requirements
Misuse and Abuse Cases
Testing Security Requirements
Security Requirements Exercise
 
Advanced Techniques: IAST, RASP, and HAST
What They Are
Goals
How These Tools Work
Pros and Cons
Tools
 
Penetration Testing
What It Is
When It Should be Performed
How It Works
Enumeration and Footprint Analysis
Tool Categories
Pen Testing Exercise
 
Class Schedule
Sign-In/Registration 7:30 - 8:30 a.m.
Morning Session 8:30 a.m. - 12:00 p.m.
Lunch 12:00 - 1:00 p.m.
Afternoon Session 1:00 - 5:00 p.m.
Times represent the typical daily schedule. Please confirm your schedule at registration.
Class Fee Includes
• Tuition
• Course notebook
• Letter of completion
Instructors

Questions?

On-Site Training

Let us bring the training directly to you! Choose from over 60 courses.

Combine World-Class Training and

Certification with a Conference

Maximize Your Learning Potential

STAR Conference logo

Agile + DevOps Conference logo

Agile Testing Days Conference logo