• Course
  • Vendor

Learn to apply the best of DevOps, secure application practices, and operational security to your entire team’s IT workflow. When your teams invest in security early and often, the risk to the entire organization is dramatically reduced.

  • Course Start Date: 2024-04-15
  • Time: 10:00:00 - 18:00:00
  • Duration: 3 Day(s)
  • Location: Virtual
  • Delivery Method(s): Virtual Instructor Led
$2,731.00
REGULAR PRICE $3,413.00 Save $682.00
2 discount seats left!
or make an offer

Course Outline

Lessons

Led by a senior expert, teach your teams how to improve the DevSecOps practice – from guiding principles to daily technical execution.

This DevSecOps training boot camp is the most practical, in-depth educational solution for teams who want to understand, apply and improve their skills on “shifting left” in IT security. This expert-led boot camp focuses on the principles, processes, and technical skills necessary to make security and risk profiling a front-end priority: embracing a “quality first” mindset. Teams will leave class understanding that they have a responsibility for how applications and IT services perform when they are complete and in production…even if they are involved primarily in design, development or testing applications. For IT teams primarily on the end of the operations of the spectrum, this class will teach them how to shift left and collaborate on the upstream work that ultimately impacts the IT security environment, the organization’s risk management, and their own daily jobs.

In this DevSecOps Training Course, You will Learn How to:

  • Assess, specify and automate much of the work associated with application security
  • Bridge the typical functional silos in IT that prevent proactive security practices
  • Translate common risks into technical use cases and software requirements
  • Apply “security first” engineering and testing practices throughout the entire application pipeline
  • Use static analysis, broader unit test coverage, and code quality reviews specifically for security
  • Translate the OWASP risks into practical, actionable software development best practices
  • Deploy for security
  • Tie secure development practices and automated engineering to GRC and audit requirements
  • Try new approaches to change management for increased speed, automation, and security
  • Use DevOps-style metrics to measure and monitor security practices and performance
  • Promote the cultural practices that lead to improved responsibility for security outcomes
  • Go back to work with a plan to implement what you learn

Course Outline

Part 1: DevOps, Security, and DevSecOps: Definitions

  1. DevOps
  2. Security
  3. Risk
  4. Culture
  5. Agility
  6. Testing
  7. Continuous Integration
  8. Continuous Delivery

Part 2: Where do we start with security?

  1. Risk review
  2. Policy
  3. Roles
  4. Compliance, regulatory and GRC
  5. The Pipeline Model
  6. Exercise A: Value Stream Mapping

Part 3: Security as a DevOps practice

  1. Traditional vs. “DevOps” security
  2. Tools vs. processes
  3. Security, not compliance
  4. Prioritizing testing for risk
  5. Reducing source code footprint
  6. Static analysis for secure code
  7. Feature toggles for security
    • Toggle points
    • Toggle router
    • Toggle configuration
  1. DevSecOps and technical debt management

Part 4: DevSecOps and “requirements”

  1. Designing for security
  2. Assessing risk appetite
  3. Modeling threats
  4. Product architecture
  5. Use cases, antipatterns and abuse cases
  6. Dataflows and trust boundaries

Exercise B: Threat Modeling

Part 5: Secure development patterns

  1. Secure code overview
  2. OWASP review
  3. Tools for automating OWASP
    • OWASP dependency checkers
    • OWASP Zap during regular functional tests
  4. Developer guidelines & checklists
  5. Tools to use
  6. Coding Standards (top 5 languages)
  7. Common pitfalls
  8. Identifying Unsafe Code

Part 6: Security Testing in the Pipeline

  1. Testing before commit
  2. Scanning for secrets
  3. Hook examples
  4. Application security testing
    • Static
    • Dynamic
  5. Testing dependencies
  6. How to treat manual testing
  7. Performance Testing
    • Testing for load
    • Testing for stress
    • Soak tests
    • Spike testing
  8. Testing in parallel
  9. Staging
  10. Mutation testing and tools for performing it
  11. User role testing

Part 7: Identity and Access Management (IAM)

  1. IAM overview
  2. Identity profiles
  3. Using IAM for automation
  4. IAM practices in the cloud
  5. IAM as an application building block
  6. IAM antipatterns
  7. Guided discussion: IAM in a Microservices use case

Part 8: Deployment patterns for security

  1. Canary candidates
  2. Dark launches
  3. Streamlining libraries and dependencies
  4. Keeping packages up to date
  5. Keeping deploys repeatable and reliable
  6. OpenSCAP for scanning baselines before and after deployments
  7. Scanning web server configuration
  8. Database exploitation through applications
  9. Infrastructure scanning
    • OpenVAS
    • NMAP
  10. Scanning web applications
    • W3AF
    • Wapiti

Part 9: DevSecOps and Operations

  1. Where does Ops security begin and end?
  2. Infrastructure as Secure Code
  3. Incident response planning and emergency drills
  4. Release Archives
  5. OS Protections:
    • Address Space Layout Randomization
    • Non-Executable Stacks
    • W^X
    • Data Execution Prevention
    • SELinux
  6. Monitoring, logging and intelligent alerts
    • Splunk mini-tour: A transformative tool for analyzing machine data, operational risk, and application health
  7. Log management
  8. Penetration Testing

Exercise C: Profiling a DevSecOps Hybrid model

Part 10: Policy, Governance, and Audit

  1. GRC review
  2. Coding for compliance
  3. DevOps and the “segregation of duties”
  4. Tooling example: Chef InSpec
  5. Change management and policy
  6. Exercise D: Automated vs. Manual, to comply with Audit requirements

Part 11: Change management and DevSecOps

  1. Three types of “change”
  2. When and why to use CAB boards
  3. Peer review vs. change management
  4. Automating change management
  5. ITIL in 2020

Part 12: Measurement and metrics

  1. The core toolkit of metrics
  2. The best way to institute alerts
  3. Managing alerts
  4. Proactive vs. reactive metrics
  5. Measurement antipatterns

Part 13: More advice on the cultural factors

  1. Security fails and breakdowns
  2. Incentive, fear, and reward
  3. Getting outside IT
  4. How to shift left
  5. Building security in
  6. Cost and the business case for proactive security
  7. Overcoming conventions of the past
  8. Bridging silos – why and how
  9. Exercise E: Rearranging incentives

Part 14: Putting it all together

  1. Class recap and final questions
  2. What will you do differently when you return to work?

Who should attend

  • Anyone in an IT Leadership role
  • CIOs / CTOs /CSO
  • Security Administrators
  • Any Security Staff
  • System Administrators
  • IT Operations Staff
  • Release Engineers
  • Configuration Managers
  • Anyone involved with IT infrastructure
  • Developers and Application Team leads
  • ScrumMasters
  • Software Managers and Team Leads
  • IT Project & Program Managers
  • Product Owners and Managers

Cancellation Policy

If a change needs to be made to your public course registration (cancel, transfer, or substitution) ASPE must receive written notice via email at customerservice@aspeinc.com or fax at 919-816-1710. If a cancel or transfer request is made less than 15 business days prior to the class start date, payment will still be due, no refunds will be issued and you will be charged a $200 change fee. Your paid tuition will be available for one year to be used as a credit towards another course of equal value; only one reenrollment opportunity is allowed. Failure to attend the course without written notification will result in forfeiture of the full course price. Student substitutions may be made at any time prior to the start of class free of charge. If ASPE is forced to cancel a course for any reason, liability is limited to the registration fee only.

Training Location

Virtual
Your Address

Your City, Your Province
Your Country   

About ASPE Training Inc.

x

ASPE is a training company committed to providing training. We provide real-world, unbiased, pragmatic training and consulting on all aspects of the software development life cycle. Our catalog includes courses in Agile Software Development, Project Management, Business Requirements & Analysis, and Software Testing. Our training courses are offered via public open enrollment classes in some Canadian cities and virtually, or can be custom tailored to your needs through our highly regarded onsite (private) delivery practice.

Our courses incorporate real, hands-on experience from real professionals in all of our training courses in order to maximize the amount of knowledge and skills you acquire. Too often, students leave a course learning information, but not being able to apply it to real-world situations. Our goal is for you to be able to actualize the skills and tools you learn in the course and having no doubt that you can apply them within your organization on a daily basis.  

Training Provider Rating

This vendor has an overall average rating of 4.53 out of 5 based on 5 reviews.

No comment
No comment
No comment
No comment
Course was professionally conducted and the opportunity for practice the concepts with hands on exercises was very useful.

Course Reviews

No Reviews Yet

More Courses from ASPE Training Inc.

ASPE TRAINING INC.
2024-04-08
Virtual
ASPE TRAINING INC.
2024-05-30
Virtual
ASPE TRAINING INC.
2024-04-16
Virtual
ASPE TRAINING INC.
2024-05-13
Virtual

More Courses in 'Category to be Determined' Category

GLOBAL KNOWLEDGE
2024-07-15
Virtual
ASPE TRAINING INC.
2024-05-02
Virtual