DevSecOps for Software Engineers and Architects Certificate requires 60 hours of training to complete the certificate. Most students will take classes from the listing below to complete the certificate. Other students may choose to substitute courses from other certificates including: Introduction to Software Design and Engineering, Software Engineering Cloud, SAFe for Engineers and Architects. Each course counts towards one certificate only.
Developers Track - Choose 60+-Hours:
Introduction to DevSecOps (18 Hours): This course is designed for those that want to understand, apply and improve their DevSecOps skills. In this course you will learn DevSecOps processes, tools, and techniques, Major Components in a DevOps Pipeline, How to create and maintain DevSecOps pipelines using CSA, SAST, DAST, and Security as Code, and how to mature an organizations’ s DevSecOps program.
Building a Full CI/CD Pipeline (18 Hours): This course will provide hands-on experience building out a CI/CD pipeline from start to finish. It begins with source control management and ends with a fully-orchestrated pipeline using Jenkins. This DevOps CI/CD Pipeline training teaches attendees Git topics from the ground up, allowing students to securely push code to a remote Git repository. Next, attendees learn how to configure servers using a Configuration Management tool from code stored in Git. Finally, they integrate Git and Configuration Management with a CI/CD tool to build, test, and deploy your code into Test, Staging, and Production environments, creating an automated end-to-end DevOps pipeline.
Docker (18 Hours): Linux containers are changing the way companies think about service development and deployment. Containers play a vital role in the modern data-center, and Docker is leading the way. This course covers all the core features of Docker including: container creation and management, interacting with Docker hub, using Dockerfile to create and manage custom images, advanced Docker networking (how to safely expose container services to the world, and link containers), the use of Docker volumes to manage persistent data, and Docker Compose to build multi-container applications. Emphasis is placed on best practices and how to secure Docker installations and containers. The course culminates with comprehensive labs where students use Docker, Git, and a continuous integration server to automate the testing of containerized applications. Docker is a dominant force in Linux containers and the core building block for nearly all higher level container management systems. This training will get sysadmins proficient with Docker so that they can immediately be productive as organizations continue to move applications onto containers.
Kubernetes for Developers (18 Hours): Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. In this course students learn how to containerize, host, deploy, and configure an application in a multi-node cluster. Starting with a simple script, students define application resources and use core primitives to build, monitor and troubleshoot scalable applications in Kubernetes. Working with network plugins, security and cloud storage, you will be exposed to many of the features needed to deploy an application in a production environment. This course is designed to be vendor- and distribution-neutral, so students will be able to apply these concepts universally. This course is intended for developers that need to understand all aspects of how to containerize, host, deploy, and configure an application in a multi-node cluster.
Introduction to Terraform (6 Hours): In this course, students learn how to use Terraform to create, manage, and maintain resources. Topics include what is an Infrastructure as Code tool, how to install Terraform, how to deploy infrastructure using Terraform, configurations, Terraform Provisioners, Modules and Workspaces. Students learn how to control and automate your AWS environments.
Ansible Automation (18 Hours): This course presents the system management and configuration tool Ansible, from methods, techniques, capabilities to implementation. Each participant will learn how to configure an Ansible control machine along with the impact on the Linux system. A lot of time and attention will be spent in learning, writing, and applying playbook definitions, the key part of Ansible that allows the synchronization of environments easily and uniformly, to apply to Linux, Unix and Windows systems.
Information Security Essentials (12 Hours): This 2-day or 4-night course is a comprehensive overview of Information Security covering the most relevant practices in information security today. In this class, students explore the techniques and methodologies used to configure, build, deliver, and troubleshoot network security. Topics include the role of information security in the enterprise, formal data classification, enterprise identity management, the components of comprehensive and layered security architecture, and the threat of viruses, worms, Trojans and improper configurations.
Cyber Secure Coding with C++ (18 Hours)
This course will cover topics and techniques for development of secure C++ programs. Topics will range the gamut from high level security and risk concepts and design strategies to low-level memory access exploitation and injection attacks. General secure development approaches applicable to any language will be discussed, but the course will also focus on C++-specific techniques and pitfalls to avoid. Topics include string management, dynamic memory management, integer security, formatted output, and file I/O.
Cyber Secure Coding with C++, Advanced (12 Hours)
This three-day course provides a detailed explanation of common programming errors in C and C++ and describes how these errors can lead to code that is vulnerable to exploitation. This course will cover topics and techniques for development of secure C++ programs. Topics will range the gamut from high level security and risk concepts and design strategies to low-level memory access exploitation and injection attacks. General secure development approaches applicable to any language will be discussed, but the course will also focus on C++-specific techniques and pitfalls to avoid. Topics include string management, dynamic memory management, integer security, formatted output, and file I/O.
Administration Track - Choose 42 hours above as well as the following:
Kubernetes Administration (24 Hours): This Kubernetes Administration course covers the topics of the CKA (Certified Kubernetes Administrator) exam. Topics covered include installation, application lifecycle managment, networking, storage, security, scheduling, logging, maintenance, and troubleshooting of Kubernetes.
Advanced DevSecOps for Software Engineers and Architects Certificate - 90 Hour
In order to complete the Advanced Software Engineering Cloud Certificate, students must complete 90 hours of class(es) in the DevSecOps for Software Engineers and Architects Certificate. Students may elect to substitute hours from any of the certificates listed below:
- Software Engineering and Architecture
- Software Engineering Cloud Certificate
- SAFe for Software Engineers and Architects
- Introduction to Software Design and Engineering OOAD and Programming Track
- Introduction to Software Design and Engineering OS and Network Programming Track
Each course counts towards one certificate only.