CONTENUTI
Realizing DevSecOps Outcomes
- Origins of DevOps
- Evolution of DevSecOps
- CALMS
- The Three Ways
Defining the Cyberthreat Landscape
- What is the Cyber Threat Landscape?
- What is the threat?
- What do we protect from?
- What do we protect, and why?
- How do I talk to security?
Building a Responsive DevSecOps Model
- Demonstrate Model
- Technical, business and human outcomes
- What’s being measured?
- Gating and thresholding
Integrating DevSecOps Stakeholders
- The DevSecOps State of Mind
- The DevSecOps Stakeholders
- What’s at stake for who?
- Participating in the DevSecOps model
Establishing DevSecOps Best Practices
- Start where you are
- Integrating people, process and technology and governance
- DevSecOps operating model
- Communication practices and boundaries
- Focusing on outcomes
Best Practices to get started
- The Three Ways
- Identifying target states
- Value stream-centric thinking
DevOps Pipelines and Continuous Compliance
- The goal of a DevOps pipeline
- Why continuous compliance is important
- Archetypes and reference architectures
- Coordinating DevOps Pipeline construction
- DevSecOps tool categories, types and examples
Learning Using Outcomes
- Security Training Options
- Training as Policy
- Experiential Learning
- Cross-Skilling
- The DevSecOps Collective Body of Knowledge
- Preparing for the DevSecOps Foundation certification exam
Durante il corso, i partecipanti verranno preparati per l’esame: verranno esplicitati i requisiti, evidenziati gli argomenti più importanti e fornito il glossario.
Inoltre, è prevista la revisione di un’esercitazione d’esame.