This course is designed to provide students with the knowledge and skills required to develop secure applications using DevSecOps. Students will learn about the principles and practices of DevSecOps, cybersecurity, penetration testing, vulnerability assessment, data encryption, firewall, DMZ, MITRE attack, purple teaming, Defense in Depth, and RTO/RPO. Students will gain hands-on experience with tools and techniques used in each stage of the software development lifecycle, and will develop secure applications that meet the needs of their organization.

Lesson 1: Introduction to DevSecOps

  • Definition of DevSecOps
  • Benefits of DevSecOps
  • Comparison with traditional DevOps

Lesson 2: Cybersecurity

  • Overview of cybersecurity
  • Types of cybersecurity threats
  • Best practices for cybersecurity

Lesson 3: Penetration Testing

  • Overview of penetration testing
  • Types of penetration testing
  • Methods and tools used in penetration testing

Lesson 4: Vulnerability Assessment

  • Overview of vulnerability assessment
  • Types of vulnerability assessment
  • Methods and tools used in vulnerability assessment

Lesson 5: Firewall

  • Overview of firewall
  • Types of firewall
  • Methods and tools used in firewall

Lesson 6: DMZ

  • Overview of DMZ
  • Types of DMZ
  • Methods and tools used in DMZ

Lesson 7: MITRE Attack

  • Overview of MITRE attack
  • Types of MITRE attack
  • Methods and tools used in MITRE attack

Lesson 8: Purple Teaming

  • Overview of purple teaming
  • Types of purple teaming
  • Methods and tools used in purple teaming

Lesson 9: Defense in Depth

  • Overview of defense in depth
  • Types of defense in depth
  • Methods and tools used in defense in depth

Lesson 10: Secure Identity Management

  • Overview of secure identity management
  • Types of secure identity management
  • Methods and tools used in secure identity management

Lesson 11: Recovery Time Objective (RTO)

  • Definition of RTO
  • Calculation of RTO
  • Best practices for RTO

Lesson 12: Recovery Point Objective (RPO)

  • Definition of RPO
  • Calculation of RPO
  • Best practices for RPO

Lesson 13: Data Security

  • Overview of data security
  • Types of data security threats
  • Best practices for data security

Course Information

Difficulty: Beginner

Categories:

Tags: ,

Course Instructor

Ardent XR Ardent XR Author

This course does not have any sections.