About This Course
The DevSecOps Training Program is designed to help professionals integrate security practices into every phase of the DevOps lifecycle. This course focuses on building secure CI/CD pipelines, automating security testing, and implementing best practices for containerized applications.
Through hands-on labs and real-world projects, learners will gain practical experience with industry-standard DevSecOps tools and methodologies. By the end of this program, you will be able to design, deploy, and manage secure applications with confidence while meeting modern compliance and security standards.
What You’ll Learn?
- DevOps & CI/CD Security fundamentals
- CI/CD with Jenkins(Master and slave Architecture)
- Kubernetes best practices
- SAST & DAST tools
- Container security (Docker, Trivy)
- Cloud basics(AWS)
Objectives
- Integrate security throughout the DevOps lifecycle
- Implement secure CI/CD pipelines with automation
- Use SAST and DAST tools to identify vulnerabilities
- Secure containers and Kubernetes environments
- Apply Kubernetes security best practices
- Implement secrets management and access controls
Target Audience
- Fresh IT graduates with basic Linux, Git, or networking knowledge
- System & Linux Administrators transitioning to DevOps Roles
- IT Security beginners interested in DevSecOps practices
- Developers who want to learn CI/CD environments
- Engineers responsible for deploying applications in production
Topics for This Course
Gain hands-on experience with DevSecOps tools, cloud security, CI/CD pipelines, containerization, automation, and best practices for secure software delivery.
-
Linux commands, users, permissions
-
Package management & networking basics
-
Nginx – Reverse proxy, Load balancing, Hosting sites
-
Tomcat – Hosting Sites and act as backend
-
HA Proxy as Loadbalancers
-
What is Continuous Integration and Continuous Deployment?
-
CI/CD pipeline overview
-
Jenkins
-
Jenkins installation & architecture
-
Declarative pipelines
-
Automating builds and deployments
-
Introduction to Docker
-
Docker images, containers, and volumes
-
Dockerfile creation
-
Dockerhub(public Registry) and Harbor (private Registry)
-
Installation of Harbor (private Registry)
-
Docker images & registries(Dockerhub and Harbor)
-
Static code analysis with SonarQube
-
Vulnerability scanning with Trivy
-
-
OWASP Dependency Check
-
Integrating scans into CI pipeline
-
Kubernetes architecture
-
Pods, ReplicaSets, Deployments
-
Deploying applications on Kubernetes
-
Services,Ingress
-
Scaling applications and rolling updates in Kubernetes
-
Rancher – GUI for Kubernetes Management
-
What is GitOps?
-
ArgoCD architecture
-
Connecting ArgoCD to Git repos
-
Sync strategies (Auto / Manual)
-
Managing Kubernetes deployments with ArgoCD
-
Importance of monitoring and logging in DevOps
-
Tools for monitoring: EFK
-
Centralized logging for applications
-
Terraform workflow (init, plan, apply)
-
Writing and managing IaC scripts
-
Deploying and managing infrastructure with Terraform