DevOps Institute: DevSecOps Foundation - Including Exam [DEVSOF]
computer Online: VIRTUAL TRAINING CENTER 26 mrt. 2026 tot 27 mrt. 2026Toon rooster event 26 maart 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL252821.1 event 27 maart 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL252821.2 |
computer Online: VIRTUAL TRAINING CENTER 23 apr. 2026 tot 24 apr. 2026Toon rooster event 23 april 2026, 10:30-18:00, VIRTUAL TRAINING CENTER, NL244841.1 event 24 april 2026, 10:30-18:00, VIRTUAL TRAINING CENTER, NL244841.2 |
placeEindhoven (Evoluon Noord Brabantlaan 1) 21 mei. 2026 tot 22 mei. 2026Toon rooster event 21 mei 2026, 09:00-17:00, Eindhoven (Evoluon Noord Brabantlaan 1), NL252819.1 event 22 mei 2026, 09:00-17:00, Eindhoven (Evoluon Noord Brabantlaan 1), NL252819.2 |
computer Online: VIRTUAL TRAINING CENTRE 21 mei. 2026 tot 22 mei. 2026Toon rooster event 21 mei 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL252819V.1 event 22 mei 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL252819V.2 |
computer Online: VIRTUAL TRAINING CENTER 9 nov. 2026 tot 10 nov. 2026Toon rooster event 9 november 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL252823.1 event 10 november 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL252823.2 |
placeAmsterdam ARISTO (Teleportboulevard 100) 19 nov. 2026 tot 20 nov. 2026Toon rooster event 19 november 2026, 09:00-17:00, Amsterdam ARISTO (Teleportboulevard 100), NL252820.1 event 20 november 2026, 09:00-17:00, Amsterdam ARISTO (Teleportboulevard 100), NL252820.2 |
computer Online: VIRTUAL TRAINING CENTRE 19 nov. 2026 tot 20 nov. 2026Toon rooster event 19 november 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL252820V.1 event 20 november 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL252820V.2 |
Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge
Online of op locatie er is altijd een vorm die bij je past.
Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.
OVERVIEW
Integrating security practices into DevOps, such as Security as Code, is a way for security practitioners to operate and contribute value with less friction. Security practices must adapt dynamically to ensure data security and privacy issues are not left behind in the fast-paced world of DevOps
AUDIENCE
Target audience:
- Anyone involved or interested in learning about DevSecOps strategies and automation
- Anyone involved in Continuous Delivery toolchain architectures
- Compliance Team
- Delivery Staff
- DevOps Engineers
- IT Managers
- IT Security Professionals, Practitioners, and Managers
- Maintenance and support staff
- Managed Service Providers
- Project & Product Manag…
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge
Online of op locatie er is altijd een vorm die bij je past.
Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.
OVERVIEW
Integrating security practices into DevOps, such as
Security as Code, is a way for security practitioners to operate
and contribute value with less friction. Security practices must
adapt dynamically to ensure data security and privacy issues are
not left behind in the fast-paced world of DevOps
AUDIENCE
Target audience:
- Anyone involved or interested in learning about DevSecOps strategies and automation
- Anyone involved in Continuous Delivery toolchain architectures
- Compliance Team
- Delivery Staff
- DevOps Engineers
- IT Managers
- IT Security Professionals, Practitioners, and Managers
- Maintenance and support staff
- Managed Service Providers
- Project & Product Managers
- Quality Assurance Teams
- Release Managers
- Scrum Masters
- Site Reliability Engineers
- Software Engineers
- Testers
CERTIFICATION
Exam Details
Questions: 40
Languages: English, Brazilian Portuguese, Chinese
Format: Multiple Choice
Passing Score: 65%
Delivery: Web-based
Duration: 60 minutes
Open Book: Yes
CONTENT
Cyber Threat Landscape (CTL)
Tactics, techniques and procedures (TTPs) describe how threat agents orchestrate and manage attacks. Threat Models optimize security by identifying objectives and vulnerabilities such as OWASP top ten, before defining counter-measures. Continuous Delivery practices are engaged to realize continuous governance, risk management and compliance.
Responsive DevSecOps Model
Security is made continuously adaptive and auditable by
breaking security silos, cultivating a symbiotic relationship
between security and other business units. Security specific
practices and integrated toolsets as code (such as security scans)
enable automated security KPIs and observable security
practices into the DevOps value stream.
DevSecOps Stakeholders
Gaps between traditional waterfall security cultures and
fast-paced DevOps cultures, are removed by building collaboration
and trust. Through improving credibility, reliability and empathy
while reducing self-interest. Decisions are based on advice from
everyone affected and people with expertise using systems thinking.
Shared metrics assure adaptable governance using discipline, with
automation, transparency and accountability.
Realizing DevSecOps Outcomes
Security is built into the value stream efficiently with
empowered development teams implementing features securely,
shift-left security testing, tools for automated feedback. Culture
improvements instead of policy enforcements ensure security and
software engineers are continuously cross-skilling and
collaborating.
Pipelines & Continuous Compliance
Security test and scanning tools are integrated into the CI/CD
pipeline to finding known vulnerabilities (published CVEs) and
common software weaknesses (CWEs). Repetitive security tasks are
automated such as configurations, Fuzz testing and long running
security tasks. Compliance as Code helps in automating compliance
requirements to foster collaboration, repeatability, and continuous
compliance.
DevSecOps Practices
Security is integrated into people, process, technology and
governance practices. Continuous security practices for DevSecOps
are implemented in onboarding processes for stakeholders. Security
practices and outcomes are monitored and improved using data-driven
decision making and response patterns. Lean and value stream
thinking ensure that security does not cause waste, delays or
constraints for flow.
Getting Started
Value Stream Mapping establishes where security activities and
bottlenecks currently happen. Collaborative design of a target
value state map addresses security requirements, communication and
automation improvements. Scope of the design includes practices for
Artifact Management, Risk Management, Identity Access Management,
Secrets Management, Encryption, Governance, Risk and Compliance,
Monitoring and Logging, Incident response and learning
Learning Using Outcomes
Continuous DevSecOps learning programs are implemented to meet evolving security requirements for the organization and individuals using strategies such as lunch and learns, mentoring, professional education, employee learning plans, structured training classes, Dojos, retrospective learning, gamification, and DevOps Institute SKILup Days.
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

