Implementation and work in DevSecOps - course 88,000 rub. from Otus, training 5 months, Date October 30, 2023.
Miscellaneous / / November 30, 2023
Today we are constantly faced with hacker attacks, email fraud and data leaks. Online work has become a business requirement and a new reality. Developing and maintaining code and protecting infrastructure with security in mind is becoming a paramount requirement for IT specialists. It is these specialists who are the highest paid and in demand among large employers: Microsoft, Google, Amazon Web Services, Mail. Ru Group, Yandex, Sberbank and others.
Who is this course for?
Developing infrastructure and application stacks in the continuous flow of Agile DevOps changes requires continuous work with information security tools. The traditional perimeter-focused security model no longer works. In DevOps, responsibility for security falls on all participants in the Dev[Sec]Ops process.
The course is intended for specialists in the following profiles:
- Developers
- DevOps engineers and administrators
- Testers
- Architects
- Information security specialists
- Specialists who want to learn how to develop and maintain applications and infrastructure with a high degree of protection from external and internal attacks in an automated DevSecOps process.
Purpose of the Course
Successful implementation of DevSecOps is possible only with an integrated approach to Tools, Business Processes and People (Participant Roles). The course provides knowledge on all three elements and was originally developed to support the CI/CD toolchain and worker transformation project DevOps process to a full DevSecOps practice using the latest automated security tools.
The course will cover the security features of the following types of applications:
- Traditional monolithic 2/3-Tier applications
- Kubernetes applications - in your own DC, Public Cloud (EKS, AKS, GKE)
- Mobile iOS and Android applications
- Applications with REST API back-end
The integration and use of the most popular open source and commercial information security tools will be considered.
The course emphasizes Scrum/Kanban practices, but the approaches and tools can also be used in the traditional Waterfall project management model.
Knowledge and skills you will acquire
- Transition from the “perimeter protection” security model to the “protection of all layers” model
- Dictionary, terms and objects used in information security tools - CWE, CVE, Exploit, etc.
- Basic standards, methods, sources of information - OWASP, NIST, PCI DSS, CIS, etc.
They will also learn how to integrate into CI/CD and use information security tools from the following categories:
- Analysis of possible attacks (Threat Modeling)
- Static analysis of source code for security (SAST)
- Dynamic application security analysis (IAST/DAST)
- Analysis of the use of third-party and open source software (SCA)
- Testing the configuration for compliance with security standards (CIS, NIST, etc.)
- Configuration Hardening, Patching
- Application of Secrets and Certificates Management
- Applying protection for REST-API inside micro-service applications and on the back-end
- Application of Web-Application Firewall (WAF)
- Next generation firewalls (NGFW)
- Manual and automated penetration testing (Penetration Testing)
- Security monitoring and response to events in information security (SIEM)
- Forensic Analysis
In addition, team leaders will receive recommendations on practices for successfully implementing DevSecOps:
- How to prepare and successfully conduct a mini-tender and PoC for the selection of tools
- How to change the roles, structure and areas of responsibility of development, support, information security teams
- How to adapt business processes of product management, development, maintenance, information security
2
courseOver 12 years of work in IT, I managed to work as a developer, tester, devops and devsecops engineer in companies such as NSPK (developer of the MIR card), Kaspersky Lab, Sibur and Rostelecom. At the moment I...
Over 12 years of work in IT, I managed to work as a developer, tester, devops and devsecops engineer in companies such as NSPK (developer of the MIR card), Kaspersky Lab, Sibur and Rostelecom. Currently I am the head of secure development at Digital Energy (Rostelecom group of companies). My practical experience is based on knowledge of the languages C#, F#, dotnet core, python, development and integration of various DevOps and DevSecOps practice tools (SAST/SCA, DAST/IAST, web application scanning, infrastructure analysis, mobile scanning applications). I have extensive experience in deploying and supporting k8s clusters, and work with cloud providers. I conduct security audits and deploy service meshes. I am the author of my own courses on programming, testing, relational and non-relational databases, working with cloud providers and administering bare-metal servers. Speaker at international conferences.
1
wellInformation Security Analyst, Sovcombank
Experience in information security since 2018 Specialization: - Infrastructure security control - Building vulnerability management processes for various platforms (microservices and DevOps, Host OS, network equipment OS, Mobile, DB, Virtualisation) - Management of information security policies and requirements within infrastructure and projects development. Teacher
1
wellHas been auditing commercial networks since 2017. Participated in the development of a security model for the interstate bank of Ukraine "AT Oschadbank" The main feature of testing is pentest using the "black box" method. Working with python and bush since 2016...
Has been auditing commercial networks since 2017. Participated in the development of a security model for the interstate bank of Ukraine "AT Oschadbank"The main feature of testing is pentest using the "black box" methodWorking with python and bush since 2016Experience in working with unix systems, in particular distributions based on Debian. Teacher
Information security knowledge base
-Topic 1. Dictionary, terms, standards, methods, sources of information used in information security tools
-Topic 2. Basic principles of ensuring information security of the application stack and infrastructure
OWASP Vulnerability Overview
-Topic 3. Analysis of OWASP Top 10 Web vulnerabilities
-Topic 4. Analysis of OWASP Top 10 vulnerabilities - REST API
Features of developing secure code and using frameworks
-Topic 5. Secure development in HTML/CSS and PHP
-Topic 6. Secure development and software code vulnerabilities
-Topic 7. Secure development in Java/Node.js
-Topic 8. Secure development in .NET
-Topic 9. Secure development in Ruby
Development of secure container and serverless applications
-Topic 10. Ensuring security in Linux OS
-Topic 11. Ensuring security in Docker containers
-Topic 12. Securing Kubernetes
Integration and work with information security tools within DevSecOps
-Topic 13. Ensuring the security of the CI/CD toolchain and DevOps process
-Topic 14. Review of DevSecOps tools
-Topic 15. Security analysis of source code (SAST/DAST/IAST)
-Topic 16.Using protection for REST-API inside micro-service applications and on the back-end.
-Topic 17.Use of Web-Application Firewall (WAF) for Web protection, REST API, Bot protection.
-Topic 18.Modern network perimeter security tools (NGFW/Sandbox)
-Topic 19. Threat modeling and penetration testing
-Topic 20. Security monitoring and response to events in information security (SIEM/SOAR)
-Topic 21. Project plan and methodology for transforming an organization into DevSecOps.
Project module
-Theme 22.Selecting a theme
-Topic 23. Consultations and discussions of project work
-Topic 24.Protection of projects