Agile + DevOps USA 2024 Pre-conference Training : Implementing DevSecOps
Sunday, October 13, 2024 - 8:30am to Monday, October 14, 2024 - 5:00pm

Implementing DevSecOps

  • Learn how to build security into your DevOps process
  • Learn how to use security requirements to plan your testing efforts
  • Explore key aspects of security testing – web security, threat modeling, risk assessment
  • Learn how security testing can be effectively leveraged within a DevOps pipeline
  • Understand how DevSecOps builds upon DevOps practices
  • Understand how technical and automation skills can be leveraged in your DevSecOps efforts
  • Develop practical experience through the completion of hands-on exercises

Your organization has started moving toward a DevOps way of thinking and working, and you have started to set up a delivery pipeline. However, you realize that security testing is missing from your pipeline, and you know that testing for security early and often is an important part of ensuring that your system is free from vulnerabilities.

If you are looking for a way to include security testing in your pipeline and turn your DevOps practice into a DevSecOps practice, then this course is for you. You will learn how DevSecOps builds upon the principles and practices of DevOps and how to integrate security testing tools into the various stages of the pipeline. This course will give you hands-on practice with configuring and using these tools so that you will be prepared to introduce DevSecOps to your own organization.

Who Should Attend?
This course is appropriate for software professionals who are involved with development, testing, security, and operations and who want to incorporate security testing into their organization’s pipeline. Because this course has a heavy focus on hands-on exercises, it is most appropriate for practitioners and will not be tailored toward management or leadership.

Laptop Required
This class involves hands-on activities using sample software to better facilitate learning. Each student should bring a laptop with an SSH or PuTTY client preinstalled. Connection specifics and credentials will be supplied during class. Please verify permissions with your IT Admin before class. If you or your Admin have questions about the specific applications involved, contact our Client Support team.


Course Outline
DevOps Refresher
Dev vs. Ops
DevOps Principles
Security Refresher
Definition of Information Security
History of Information Security
State of Application Security
DevSecOps Overview
Relevant Terms
Benefits and Drawbacks
Tool Types
Risk Assessment
Importance of Software Security
Understanding Risk
Risk Assessment Exercise
Threat Modeling
Microsoft STRIDE
Architectural and Design Reviews
Threat Modeling Exercise
Software Composition Analysis (SCA)
SCA Exercise
Static Application Security Testing (SAST)
What It Is
Why We Need It
Pros and Cons
SAST Exercise
Dynamic Application Security Testing (DAST)
What It Is
How DAST Tools Work
Pros and Cons
DAST Exercise


Log Management
Log Management Exercise
Monitoring Exercise
Security Information and Event Management (SIEM)
SIEM Exercise
Security Requirements Testing
Functional vs. Non-functional Requirements
Misuse and Abuse Cases
Testing Security Requirements
Security Requirements Exercise
Advanced Techniques: IAST, RASP, and HAST
What They Are
How These Tools Work
Pros and Cons
Penetration Testing
What It Is
When It Should be Performed
How It Works
Enumeration and Footprint Analysis
Tool Categories
Pen Testing Exercise
Class Daily Schedule
/Registration 7:30 - 8:30 a.m.
Morning Session 8:30 a.m. - 12:00 p.m.
Lunch 12:00 - 1:00 p.m.
Afternoon Session 1:00 - 5:00 p.m.
Times represent the typical daily schedule. Please confirm your schedule at registration.
Training Course Fee Includes
• Digital course materials
• Continental breakfasts and refreshment breaks
• Lunches
• Letter of completion
Derrick Roach

Derrick Roach is a member of the Application Security Team at Coveros and an accomplished information security professional with experience implementing security programs as well as securing enterprise assets. Previously serving in an IT analyst capacity, he swiftly observed the necessity to integrate security into all critical systems and processes, from infrastructure to people. As his awareness grew, Derrick made strategic and tactical moves to lead security initiatives that strengthened the organization’s security posture. Derrick is a Certified Information System Security Professional (CISSP) and is dedicated to advancing security awareness, promoting DevSecOps, and improving application security.