Autoplay
Autocomplete
Previous Lesson
Complete and Continue
DevSecOps Expert
Introduction to the course
Course outline and Syllabus
Frequently Asked Questions (FAQs)
Course Prerequisites
How to approach this course?
Demo: A full enterprise-grade DevSecOps Pipeline. (4:58)
Chapter 1: Overview of the DevSecOps
Introduction to DevSecOps (243:38)
DevSecOps Maturity Model (DSOMM) (70:50)
Exercise: Connect to the lab and explore the DevSecOps Expert exercises
QUIZ: Introduction to tools of the trade
QUIZ: Secure SDLC and CI/CD Pipelines
[Feedback] Share Your Feedback for Chapter 1
Chapter 2: Security Requirements and Threat Modelling (TM)
Security Requirements and Threat Modelling (166:51)
Hands-on: Please complete the exercises and come back
[Feedback] Share Your Feedback for Chapter 2
Chapter 3: Advanced SAST (Static Analysis) in CI/CD pipeline
Advanced SAST (212:08)
QUIZ: SAST (Static Analysis) in CI/CD Pipeline
Hands-on: Please complete the exercises and come back
[Feedback] Share Your Feedback for Chapter 3
Chapter 4: Advanced DAST (Dynamic Analysis) in CI/CD pipeline
DAST Basics (166:25)
Authenticated DAST Scans (33:53)
QUIZ: DAST(Dynamic Analysis) in CI/CD Pipeline
Hands-on: Please complete the exercises and come back
[Feedback] Share Your Feedback for Chapter 4
Chapter 5: Runtime Analysis(RASP/IAST) in CI/CD pipeline
RASP and IAST (65:51)
Hands-on: Please complete the exercises and come back
[Feedback] Share Your Feedback for Chapter 5
Chapter 6: Infrastructure as Code(IaC) and Its Security
Introduction to Infrastructure as Code (93:30)
Security as Code (197:41)
QUIZ: Infrastructure as Code and Its Security
Hands-on: Please complete the exercises and come back
Mid-course Check-in
Extend the lab access
[Feedback] Share Your Feedback for Chapter 6
Chapter 7: Container (Docker) Security
Container Security using Docker (46:33)
SAST and DAST analysis in container (19:19)
Learning Resources: Docker and its security
Hands-on: Please complete the exercises and come back
[Feedback] Share Your Feedback for Chapter 7
Chapter 8: Secrets management on mutable and immutable infra
Secrets management using Hashicorp Vault (110:12)
Hands-on: Please complete the exercises and come back
[Feedback] Share Your Feedback for Chapter 8
Chapter 9: Vulnerability Management with custom tools
Vulnerability management with Custom Tools (101:01)
Hands-on: Please complete the exercises and come back
[Feedback] Share Your Feedback for Chapter 9
Practical DevSecOps Exam/Certification Process
Exam and Certification Process Lecture (21:33)
Steps to Apply for the Exam
[Activity] Schedule the Exam
Reschedule the Exam
[Feedback] Course Feedback
Hands-on: Please complete the exercises and come back
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock