DevSecOps: Security in the CI/CD Pipeline

Anchoring security in (agile) software development processes
This training provides answers to the following questions
- What is “Early Security Testing”?
- Which are the most useful tools for automated security verification?
- Why is the early detection of vulnerabilities so important?
- How can Security-by-Design be achieved?
Headline 3
Text 3
Description
Remediating security vulnerabilities after software deployment is expensive. Compared to fixing the vulnerability during development, costs are multiplied. Consequently, the early detection of vulnerabilities (ideally directly at the time of implementation) is one of the most important goals for secure and cost-efficient software development (Shift-Left). By integrating automated security testing tools into the CI/CD pipeline, certain security problems can be identified and resolved very early in the development cycle.
In our practical DevSecOps seminar, the speaker imparts the domain knowledge necessary for a Secure Software Development Life Cycle (SSDLC). Building on this, participants will be enabled to integrate various security testing tools into the CI/CD pipeline based on our many years of practical experience. From the following categories, recommended security testing tools will be presented using practical hands-on exercises and showcases, and their best-practice use will be explained:
- Software Composition Analysis (SCA)
- Static Application Security Testing (SAST)
- Dynamic Application Security Testing (DAST)
- Interactive Application Security Testing (IAST)
- Compliance as Code (CaC)
- Infrastructure as Code (IaC)
Course content
- Basics
- The need for DevSecOps
- What is Web Application Security
- Basic Terms of IT-Security
- Secure Coding / SSDLC
- Security by Design
- Finding the right protection level
- DevSecOps – Tools and Phases
- Source Code Analysis
- Hands-On Training: SAST/DAST
- Build and Deployment
- Supply Chain Attacks
- Dependency Confusion
- Handling of 3rd Party Libraries
- Docker (Attack vectors, Image Security, Container Security)
- Hands-On Training: SCA
- Showcase: IaC
- Showcase: CaC
- Operations
- Known Vulnerabilities
- Information Disclosure
- Countermeasures on Infrastructure Level
This training is aimed at companies and organizations. It is individually tailored to your requirements and the team's prior knowledge and can be carried out in-house or online. This training can be economical from as few as three participants.
Target Group
- Software developers
- DevOps Engineers
- Architects
Duration & Format
- 1 to 2 days, individually tailored
- On-site or online training
Note
This training is also offered as a workshop, in which the individual customer situation, protection requirements, and specific starting points are incorporated and discussed in a solution-oriented manner.
Our trainers
Our promise: from practice, for practice & always up to date. That's why all our trainers are active experts with many years of experience in the subject area they teach.
Your Benefit
Our training courses not only impart knowledge, they also change mindsets. Your developers will learn to identify security vulnerabilities early on and avoid them in a targeted manner. The result: more robust applications, more confidence - and a clear advantage in everyday project work.
All trainers are actively working Security Consultants. They contribute their experience with everyday problems, which often conflict with security requirements, and thus contribute to a pragmatic, realistic approach to security.
- Practical methods instead of theory to avoid typical security gaps in web applications and mobile apps.
- Content according to the latest standards by actively working, experienced Security Consultants.
- Secure coding for long-term maintainability and quality of the source code.
- Increased security awareness in the team prevents pitfalls at an early stage.
- Protection against liability risks & damage to reputation.





