Cybersecurity Specialization: DevSecOps [GK840102]

Durée totale
Localisation
En ligne
Date et lieu de début

Cybersecurity Specialization: DevSecOps [GK840102]

Global Knowledge Belgium BV
Logo Global Knowledge Belgium BV
Note du fournisseur: starstarstar_halfstar_borderstar_border 4,5 Global Knowledge Belgium BV a une moyenne de 4,5 (basée sur 2 avis)

Astuce: besoin de plus d'informations sur la formation? Téléchargez la brochure!

Dates et lieux de début

computer En ligne: VIRTUAL TRAINING CENTER
11 août 2025 jusqu'au 13 août 2025
computer En ligne: VIRTUAL TRAINING CENTER
22 sept. 2025 jusqu'au 24 sept. 2025
computer En ligne: VIRTUAL TRAINING CENTER
3 nov. 2025 jusqu'au 5 nov. 2025
computer En ligne: VIRTUAL TRAINING CENTER
10 déc. 2025 jusqu'au 12 déc. 2025

Description

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

Learn how to integrate security within DevOps

DevSecOps is designed to empower you with the knowledge and skills necessary to seamlessly integrate security into your DevOps pipeline. You will gain a deep understanding of DevSecOps principles and practices, ensuring that security is an integral part of your software development lifecycle (SDLC). By mastering continuous security testing methods and tools, you will be equipped to identify and address vulnerabilities early, enhancing the overall security posture of your applications.

Learn the knowledge and tools to ensure continuous security and compliance, safeguarding your software solutions from potential threats.

Our Cybersecurity …

Lisez la description complète ici

Foire aux questions (FAQ)

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Vous n'avez pas trouvé ce que vous cherchiez ? Voir aussi : Cybersecurity, Devops, Développeur / Developer, CompTIA et Data privacy.

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

Learn how to integrate security within DevOps

DevSecOps is designed to empower you with the knowledge and skills necessary to seamlessly integrate security into your DevOps pipeline. You will gain a deep understanding of DevSecOps principles and practices, ensuring that security is an integral part of your software development lifecycle (SDLC). By mastering continuous security testing methods and tools, you will be equipped to identify and address vulnerabilities early, enhancing the overall security posture of your applications.

Learn the knowledge and tools to ensure continuous security and compliance, safeguarding your software solutions from potential threats.

Our Cybersecurity Specialization courses follow the 9 pillars of Cybersecurity, providing key skills necessary to be successful as a cybersecurity professional.

OBJECTIVES

  • Understand DevSecOps principles and practices to integrate security within the DevOps pipeline
  • Master secure software development lifecycle (SDLC) techniques
  • Get familiar with continuous security testing methods and tools to identify vulnerabilities early
  • Enhance secure coding practices by understanding common vulnerabilities and how to mitigate them.
  • Advanced threat modeling and risk assessment strategies
  • Implement best practices for container security using container orchestration tools.
  • Leverage Infrastructure as Code (IaC) security to secure infrastructure from the ground up
  • Master identity and access management (IAM) principles to manage user identities and permissions securely
  • Get hands-on experience with application security testing (AST) tools to uncover and remediate security flaws.
  • Utilize security information and event management (SIEM) tools for real-time analysis of security alerts
  • Develop strategies for effective incident response and digital forensics
  • Understand compliance and regulatory requirements
  • Enhancements to secure DevOps toolchains
  • Integrate cloud-specific security services provided by major cloud providers to protect cloud-based applications and infrastructure.
  • Interact with network security tools to safeguard network communications.
  • Design professional scripts to automate security tasks and improve efficiency
  • Query databases securely, ensuring data integrity and protection against database-related vulnerabilities.
  • Process and protect sensitive data using security measures to ensure compliance with data protection laws and best practices.

CONTENT

Overview of DevSecOps

  • DevSecOps principles
  • The DevOps lifecycle and security integration
  • Key challenges in implementing DevSecOps

Security by Design

  • Secure software development lifecycle (SSDLC)
  • Threat modeling and risk assessment
  • Best practices for secure coding
  • Resources: OWASP Top Ten, NIST Cybersecurity Framework

Infrastructure as Code (IaC) Security

  • Introduction to IaC and its benefits
  • Security considerations for IaC
  • Tools to Address : Terraform, Azure Resource Manager (ARM)
  • Resources To be used: Terraform: HashiCorp Terraform, Azure ARM: Azure Documentation

Continuous Integration and Continuous Security

  • Secure CI/CD pipeline design,
    • Implementing Zero Trust in CI/CD Pipelines
    • Incident Response and Recovery in CI/CD Pipelines"
  • Integrating security tools into CI/CD pipelines
    • Implementing Security Gates in CI/CD Pipelines"
  • Tools to Cover: Jenkins, GitHub Actions, Azure DevOps
  • Resources to use: Jenkins: Jenkins Documentation, GitHub Actions: GitHub Actions

Application Security Testing

  • Static Application Security Testing (SAST)
  • Dynamic Application Security Testing (DAST)
  • Tools: SonarQube, OWASP ZAP, Other SAST Tools (Checkmarx, Veracode), Other DAST Tools (Burp Suite, Acunetix)
  • Resources: SonarQube: SonarQube Documentation, OWASP ZAP: OWASP ZAP Documentation

Container Security

  • Securing Docker images and containers
  • Best practices for container security
  • Tools: Docker, Aqua Security. Kubernetes Security
  • Resources: Docker: Docker Documentation, Trivy: Aqua Trivy Documentation

Monitoring and Logging

  • Importance of monitoring and logging in security
  • Tools for monitoring and logging: ELK Stack, Prometheus, Grafana, SIEM (Security Information and Event Management), Grafana for Visualizing Security Metrics
  • Resources: ELK Stack: Elastic Documentation, Prometheus: Prometheus

Incident Response and Forensics

  • Incident response planning and execution
  • Forensic analysis and post-incident review
  • Tools: Splunk, Wireshark, SOAR (Security Orchestration, Automation, and Response), Volatility
  • Resources: Splunk: Splunk Documentation, Wireshark: Wireshark Documentation

Compliance and Governance

  • Understanding security compliance requirements
  • Implementing security policies and governance
  • Standards: GDPR, HIPAA, PCI-DSS, CCPA (California Consumer Privacy Act)
  • Resources: GDPR: EU GDPR Information, HIPAA: HIPAA Journal, PCI-DSS: PCI Security Standards Council

Data Security and Privacy

  • Protecting sensitive data
  • Encryption techniques and key management
  • Tools: Vault by HashiCorp, Azure Key Vault, Google Cloud Key Management Service (KMS), AWS Key Management Service (KMS),
  • Resources: Vault: HashiCorp Vault Documentation, Azure Key Vault: Azure

Capstone Project

Rester à jour sur les nouveaux avi

Pas encore d'avis.

Partagez vos avis

Avez-vous participé à cours? Partagez votre expérience et aider d'autres personnes à faire le bon choix. Pour vous remercier, nous donnerons 1,00 € à la fondation Stichting Edukans.

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Recevoir une brochure d'information (gratuit)

(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)

Vous avez des questions?

(optionnel)
Nous conservons vos données personnelles dans le but de vous accompagner par email ou téléphone.
Vous pouvez trouver plus d'informations sur : Politique de confidentialité.