- This event has passed.
DevSecOps Virtual Instructor Lead
December 1, 2018 @ 9:30 am - December 2, 2018 @ 5:30 pm
As companies are pushing code faster and more often than ever, the rate of vulnerabilities in our systems is accelerating. As we are being asked to do more with less, DevOps has shown immense value to business and security as an integral component that needs to be integrated into the strategy.
Topics covered in the course include how DevSecOps provides the business value of DevOps and the ability DevOps has to enable the business and support an organizational transformation with the ultimate goal of increasing productivity, reducing risk, and optimizing cost in the organization.
This course explains how DevOps security practices differ from other security approaches and provides the education needed to understand and apply data and security sciences. Participants learn the purpose, benefits, concepts, and vocabulary of DevSecOps; particularly how DevSecOps roles fit with a DevOps culture and organization. At the end of this course, participants will understand using “security as code” with the intent of making security and compliance consumable as a service.
The course is designed to teach practical steps on how to integrate security programs into DevOps practices and highlights how professionals can use data and security science as the primary means of protecting the organization and customer.
Using real-life scenarios and case studies, participants will have tangible takeaways to leverage when back at the office.
This course positions learners to successfully complete the DevSecOps Engineering exam, which is offered on the last day of class for classroom learners. Virtual learners will receive a voucher for a webcam proctored exam which they can schedule at their convenience.
Why DevSecOps is important
3 Ways to Think About DevOps+Security
Key Principles of DevSecOps
Culture and Management
- Incentive Model
- Erickson, Westrum, and LaLoux
- Strategic Considerations
Identity & Access Management
- Why IAM is important
- Implementation Guidance
Application Security Testing
- Testing Techniques
- Prioritizing Testing Techniques
- Issue Management Integration
- Threat Modeling
- Leveraging Automation
- Security Hygiene Practices
- Role of Operations Management
Governance, Risk, Compliance (GRC) and Audit
- Rethinking Policies
- Policy as Code
- Shifting Audit Left
Logging, Monitoring, and Response
Hari G, is currently Chief Information Officer for TaUB Solutions. He has ove 17+ years of expertise in Product Development, user experience (UX/UI), Business Intelligence and Analytics, and building data-driven solutions using Agile methodologies and DevOps principles. He also has strong expertise in Business Development, Sales and Delivery with Clients across geographies and served in the US region for 7 years. In his previous experience as a Technical Account Manager and Solution Architect at D&B technologies and data services, he has created collaborative teams, in alliance with technology companies like Google and Microsoft, including UX designers, business, and data analyst. He has earned Advanced Financial Risk Management from IIM (B) and M.B.A from Anna University in Technology Management.