This course is designed to provide students with the knowledge and skills required to develop secure applications using DevSecOps. Students will learn about the principles and practices of DevSecOps, cybersecurity, penetration testing, vulnerability assessment, data encryption, firewall, DMZ, MITRE attack, purple teaming, Defense in Depth, and RTO/RPO. Students will gain hands-on experience with tools and techniques used in each stage of the software development lifecycle, and will develop secure applications that meet the needs of their organization.
Lesson 1: Introduction to DevSecOps
- Definition of DevSecOps
- Benefits of DevSecOps
- Comparison with traditional DevOps
Lesson 2: Cybersecurity
- Overview of cybersecurity
- Types of cybersecurity threats
- Best practices for cybersecurity
Lesson 3: Penetration Testing
- Overview of penetration testing
- Types of penetration testing
- Methods and tools used in penetration testing
Lesson 4: Vulnerability Assessment
- Overview of vulnerability assessment
- Types of vulnerability assessment
- Methods and tools used in vulnerability assessment
Lesson 5: Firewall
- Overview of firewall
- Types of firewall
- Methods and tools used in firewall
Lesson 6: DMZ
- Overview of DMZ
- Types of DMZ
- Methods and tools used in DMZ
Lesson 7: MITRE Attack
- Overview of MITRE attack
- Types of MITRE attack
- Methods and tools used in MITRE attack
Lesson 8: Purple Teaming
- Overview of purple teaming
- Types of purple teaming
- Methods and tools used in purple teaming
Lesson 9: Defense in Depth
- Overview of defense in depth
- Types of defense in depth
- Methods and tools used in defense in depth
Lesson 10: Secure Identity Management
- Overview of secure identity management
- Types of secure identity management
- Methods and tools used in secure identity management
Lesson 11: Recovery Time Objective (RTO)
- Definition of RTO
- Calculation of RTO
- Best practices for RTO
Lesson 12: Recovery Point Objective (RPO)
- Definition of RPO
- Calculation of RPO
- Best practices for RPO
Lesson 13: Data Security
- Overview of data security
- Types of data security threats
- Best practices for data security
Course Instructor
This course does not have any sections.