757-216-3656 | Monday–Friday 8:30 AM – 4:30 PM | info@itdojo.com

Course Duration

2 Days

Audience

Employees of federal, state and local governments; and businesses working with the government.

Prerequisites

There are no formal prerequisites for this course. Familiarity with DevOps concepts and basic IT service management principles is beneficial.

Course Description

In this course, students will gain a solid understanding of the leadership requirements for successful DevOps adoption at both the tactical and strategic levels for those who help design, influence, implement and motivate the cultural transformation. This course prepares you for the DevSecOps Foundation (DSOF) certification.

Learning Objectives

  • Understanding organizational culture and organizational change
  • Conway’s Law and its influence on DevOps and systems thinking
  • Strategies for leading cultural transformations
  • Evolving silos into flat, team based organizations
  • Managing conflict
  • Creating feedback loops
  • Creating learning environments
  • Avoiding change fatigue
  • Communication and collaboration strategies
  • Meaningful metrics
  • Resourcing for DevOps
  • Demonstrating DevOps ROI
  • Critical success factors
  • Getting started

Course Outline

Course Topics
  • Course Goals
  • Course Agenda
  • Key Terms and Concepts
  • Why DevSecOps is important
  • 3 Ways to Think About DevOps+Security
  • Key Principles of DevSecOps
  • Key Terms and Concepts
  • Incentive Model
  • Resilience
  • Organizational Culture
  • Generativity
  • Erickson, Westrum, and LaLoux
  • Exercise: Influencing Culture
  • Key Terms and Concepts
  • How Much Security is Enough?
  • Threat Modeling
  • Context is Everything
  • Risk Management in a High-velocity World
  • Exercise: Measuring For Success
  • Avoiding the Checkbox Trap
  • Basic Security Hygiene
  • Architectural Considerations
  • Federated Identity
  • Log Management
  • Key Terms and Concepts
  • IAM Basic Concepts
  • Why IAM is Important
  • Implementation Guidance
  • Automation Opportunities
  • How to Hurt Yourself with IAM
  • Exercise: Overcoming IAM Challenges
  • Application Security Testing (AST)
  • Testing Techniques
  • Prioritizing Testing Techniques
  • Issue Management Integration
  • Threat Modeling
  • Leveraging Automation
  • Key Terms and Concepts
  • Basic Security Hygiene Practices
  • Role of Operations Management
  • The Ops Environment
  • Exercise: Adding Security to Your CI/CD Pipeline
  • Key Terms and Concepts
  • What is GRC?
  • Why Care About GRC?
  • Rethinking Policies
  • Policy as Code
  • Shifting Audit Left
  • 3 Myths of Segregation of Duties vs. DevOps
  • Exercise: Making Policies, Audit and Compliance
  • Key Terms and Concepts
  • Setting Up Log Management
  • Incident Response and Forensics
  • Threat Intelligence and Information Sharing
  • Where We Started
  • What We Covered
  • Key Reminders of What’s Important
  • Exercise: Creating a Personal Action Plan
  • Exam Requirements, Question Weighting and
  • Sample Exam Review
Get More Information

We cannot work with the general public. We only work with Government Agencies, Military, government contractors, and corporate clients.