DevSecOps – Full Course Syllabus
“Bridging Development, Security, and Operations – Mastering Secure Infrastructure and Automation”
Part of the CSRP Bootcamp | Phase 2 – Cybersecurity Technologies
Target Audience: Aspiring cybersecurity practitioners with foundational knowledge in networking, operating systems, and cybersecurity tools. This course is designed to introduce students to the principles of DevSecOps, combining cloud security, infrastructure management, secure software development, and automation.
Course Duration: 18 Lessons (84 Total Hours)
- 12 Instructor-Led Lessons: 4 hours each (48 hours)
- 6 Asynchronous Self-Study Lessons: 6 hours each (36 hours)
Course Format: Blended Learning (Instructor-Led + Self-Study)
Outcome: Gain practical skills in managing cloud environments, implementing secure DevOps pipelines, and using automation tools to integrate security throughout the software development lifecycle.
Course Overview:
The DevSecOps course focuses on integrating security into the software development lifecycle (SDLC), teaching students how to manage secure cloud environments, build resilient infrastructures, and automate security operations. Students will explore tools and practices such as Infrastructure as Code (IaC), CI/CD pipelines, cloud security frameworks, and containerization.
By the end of this course, students will:
✔ Understand the principles of DevOps and DevSecOps
✔ Build secure CI/CD pipelines and integrate security checks
✔ Manage cloud environments and apply best practices for cloud security
✔ Use Infrastructure as Code (IaC) to automate deployments
✔ Apply security automation to detect vulnerabilities and ensure compliance
Course Objectives:
By the end of this course, students will be able to:
- Understand the role of DevSecOps in modern cybersecurity practices
- Build and manage CI/CD pipelines using tools like Jenkins and GitHub Actions
- Secure cloud environments on AWS, Azure, and GCP
- Use Terraform and Ansible for infrastructure automation
- Apply security scanning tools (Snyk, Trivy) to detect vulnerabilities
- Implement container security with Docker and Kubernetes