DevSecOps Foundation

Price
$1,495.00

Duration
2 Days

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

In this course, students will gain a solid understanding of the leadership requirements for successful DevOps adoption at both the tactical and strategic levels for those who help design, influence, implement and motivate the cultural transformation.

Course Objectives

  • The Golden Circle
  • Understanding organizational culture and organizational change
  • Conway’s Law and its influence on DevOps and systems thinking
  • Strategies for leading cultural transformations
  • Evolving silos into flat, team based organizations
  • Managing conflict
  • Creating feedback loops
  • Creating learning environments
  • Avoiding change fatigue
  • Managing conflict
  • Communication and collaboration strategies
  • Meaningful metrics
  • Resourcing for DevOps
  • Demonstrating DevOps ROI
  • Critical success factors
  • Getting started
  • Who Should Attend?

    This course is intended for: Anyone starting or leading a DevOps cultural transformation program, Anyone interested in modern IT leadership and organizational change approaches, Business Analysts, Business Stakeholders, Consultants, DevOps tool providers, IT Operations Managers, IT Leadership, Practitioners and change agents, Project Managers, Systems Integrators, Team Leaders, Managers, Directors, Tool Suppliers

    United Training is committed to working as a partner with our clients. Choose United Training and take advantage of the following benefits.

    • Robust Public Enrollment Schedule. Enjoy access to hundreds of Guaranteed to Run dates across a diverse catalog of course titles.
    • Private Group Training. Let our world-class instructors come to you to deliver training at your place of business or we can present to your team online using our Virtual Instructor-Led Training platform.
    • Custom Training Solutions. Our subject matter experts can customize the class to specifically address the unique goals of your team.
    • Free Re-Takes. Most completed United Training courses carry our unbeatable Learning Guarantee. This guarantee allows students to repeat most United Training courses, if they are the same version, FREE OF CHARGE, within six months of completion of the courses. Exceptions: Cisco, Citrix, VMware, Red Hat, and courses provided by affiliated 3rd party training providers.

    Learning Credits: Learning Credits can be purchased well in advance of your training date to avoid having to commit to specific courses or dates. Learning Credits allow you to secure your training budget for an entire year while eliminating the administrative headache of paying for individual classes. They can also be redeemed for a full year from the date of purchase. If you have previously purchased a Learning Credit agreement with United Training, you may use a portion of your agreement to pay for this class.

    Training Coupons: Previously purchased Training Coupons can be redeemed for eligible courses. If you have previously purchased a Technical or Application Training Coupon pool with United Training, you may use your coupons to pay for this class.

    Corporate Tech Pass: Our Corporate Tech Pass includes unlimited attendance for a single person, in the following Virtual Instructor Led course types: Microsoft Office, Microsoft Technical, CompTIA, Project Management, SharePoint, ITIL, Certified Ethical Hacker, Certified Hacking Forensics Investigator, Java, Professional Development Courses and more. The full list of eligible course titles can be found at https://unitedtraining.com/eligible.

    Training Passport: A Training Passport allows you to secure up to 20 days of training to use at any time over 12 months. Your training days can be used by one member of your organization or split up among multiple employees. This course can be taken as part of your previously purchased Training Passport.

    If you have questions about Learning Credits, Technical or Application Coupons, our Corporate Tech Pass, or our Training Passport, please contact your Account Manager.

    Course Prerequisites

    There are no prerequisites for this course.

    Agenda

    1 - COURSE INTRODUCTION

    • Course Goals
    • Course Agenda

    2 - WHY DEVSECOPS

    • Key Terms and Concepts
    • Why DevSecOps is important
    • 3 Ways to Think About DevOps+Security
    • Key Principles of DevSecOps

    3 - CULTURE AND MANAGEMENT

    • Key Terms and Concepts
    • Incentive Model
    • Resilience
    • Organizational Culture
    • Generativity
    • Erickson, Westrum, and LaLoux
    • Exercise: Influencing Culture

    4 - STRATEGIC CONSIDERATIONS

    • Key Terms and Concepts
    • How Much Security is Enough?
    • Threat Modeling
    • Context is Everything
    • Risk Management in a High-velocity World
    • Exercise: Measuring For Success

    5 - GENERAL SECURITY CONSIDERATIONS

    • Avoiding the Checkbox Trap
    • Basic Security Hygiene
    • Architectural Considerations
    • Federated Identity
    • Log Management

    6 - IAM: IDENTITY & ACCESS MANAGEMENT

    • Key Terms and Concepts
    • IAM Basic Concepts
    • Why IAM is Important
    • Implementation Guidance
    • Automation Opportunities
    • How to Hurt Yourself with IAM
    • Exercise: Overcoming IAM Challenges

    7 - APPLICATION SECURITY

    • Application Security Testing (AST)
    • Testing Techniques
    • Prioritizing Testing Techniques
    • Issue Management Integration
    • Threat Modeling
    • Leveraging Automation

    8 - OPERATIONAL SECURITY

    • Key Terms and Concepts
    • Basic Security Hygiene Practices
    • Role of Operations Management
    • The Ops Environment
    • Exercise: Adding Security to Your CI/CD Pipeline

    9 - GOVERNANCE, RISK, COMPLIANCE (GRC) AND AUDIT

    • Key Terms and Concepts
    • What is GRC?
    • Why Care About GRC?
    • Rethinking Policies
    • Policy as Code
    • Shifting Audit Left
    • 3 Myths of Segregation of Duties vs. DevOps
    • Exercise: Making Policies, Audit and Compliance

    10 - LOGGING, MONITORING AND RESPONSE

    • Key Terms and Concepts
    • Setting Up Log Management
    • Incident Response and Forensics
    • Threat Intelligence and Information Sharing

    11 - COURSE REVIEW

    • Where We Started
    • What We Covered
    • Key Reminders of What’s Important
    • Exercise: Creating a Personal Action Plan

    12 - EXAM PREPARATIONS

    • Exam Requirements, Question Weighting and

    13 - TERMINOLOGY LIST

    • Sample Exam Review
     

    This class is not currently scheduled.
    Contact us and we will help you get the training you need!

     

    Do You Have Additional Questions? Please Contact Us Below.

    contact us contact us 
    Contact Us about Starting Your Business Training Strategy with United Training