DevOps Institute: DevSecOps Foundation - Including Exam [DEVSOF]
place(Virtual Training Centre) 26 Mar 2026 until 27 Mar 2026 |
computer Online: VIRTUAL TRAINING CENTER 23 Apr 2026 until 24 Apr 2026 |
computer Online: VIRTUAL TRAINING CENTER 11 Jun 2026 until 12 Jun 2026 |
computer Online: VIRTUAL TRAINING CENTER 3 Sep 2026 until 4 Sep 2026 |
place(Virtual Training Centre) 9 Nov 2026 until 10 Nov 2026 |
OVERVIEW
Integrating security practices into DevOps, such as Security as Code, is a way for security practitioners to operate and contribute value with less friction. Security practices must adapt dynamically to ensure data security and privacy issues are not left behind in the fast-paced world of DevOps.
DevSecOps Foundation? is a registered trademark of the PeopleCert group. Used under licence from PeopleCert. All rights reserved.
AUDIENCE
Target audience:
- Anyone involved or interested in learning about DevSecOps strategies and automation
- Anyone involved in Continuous Delivery toolchain architectures
- Compliance Team
- Delivery Staff
- DevOps Engineers
- IT Managers
- IT Security…
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
OVERVIEW
Integrating security practices into DevOps, such as Security as Code, is a way for security practitioners to operate and contribute value with less friction. Security practices must adapt dynamically to ensure data security and privacy issues are not left behind in the fast-paced world of DevOps.
DevSecOps Foundation? is a registered trademark of the
PeopleCert group. Used under licence from PeopleCert. All rights
reserved.
AUDIENCE
Target audience:
- Anyone involved or interested in learning about DevSecOps strategies and automation
- Anyone involved in Continuous Delivery toolchain architectures
- Compliance Team
- Delivery Staff
- DevOps Engineers
- IT Managers
- IT Security Professionals, Practitioners, and Managers
- Maintenance and support staff
- Managed Service Providers
- Project & Product Managers
- Quality Assurance Teams
- Release Managers
- Scrum Masters
- Site Reliability Engineers
- Software Engineers
- Testers
CERTIFICATION
Exam Details
Questions: 40
Languages: English, Brazilian Portuguese, Chinese
Format: Multiple Choice
Passing Score: 65%
Delivery: Web-based
Duration: 60 minutes
Open Book: Yes
CONTENT
Cyber Threat Landscape (CTL)
Tactics, techniques and procedures (TTPs) describe how threat agents orchestrate and manage attacks. Threat Models optimize security by identifying objectives and vulnerabilities such as OWASP top ten, before defining counter-measures. Continuous Delivery practices are engaged to realize continuous governance, risk management and compliance.
Responsive DevSecOps Model
Security is made continuously adaptive and auditable by
breaking security silos, cultivating a symbiotic relationship
between security and other business units. Security specific
practices and integrated toolsets as code (such as security scans)
enable automated security KPIs and observable security
practices into the DevOps value stream.
DevSecOps Stakeholders
Gaps between traditional waterfall security cultures and
fast-paced DevOps cultures, are removed by building collaboration
and trust. Through improving credibility, reliability and empathy
while reducing self-interest. Decisions are based on advice from
everyone affected and people with expertise using systems thinking.
Shared metrics assure adaptable governance using discipline, with
automation, transparency and accountability.
Realizing DevSecOps Outcomes
Security is built into the value stream efficiently with
empowered development teams implementing features securely,
shift-left security testing, tools for automated feedback. Culture
improvements instead of policy enforcements ensure security and
software engineers are continuously cross-skilling and
collaborating.
Pipelines & Continuous Compliance
Security test and scanning tools are integrated into the CI/CD
pipeline to finding known vulnerabilities (published CVEs) and
common software weaknesses (CWEs). Repetitive security tasks are
automated such as configurations, Fuzz testing and long running
security tasks. Compliance as Code helps in automating compliance
requirements to foster collaboration, repeatability, and continuous
compliance.
DevSecOps Practices
Security is integrated into people, process, technology and
governance practices. Continuous security practices for DevSecOps
are implemented in onboarding processes for stakeholders. Security
practices and outcomes are monitored and improved using data-driven
decision making and response patterns. Lean and value stream
thinking ensure that security does not cause waste, delays or
constraints for flow.
Getting Started
Value Stream Mapping establishes where security activities and
bottlenecks currently happen. Collaborative design of a target
value state map addresses security requirements, communication and
automation improvements. Scope of the design includes practices for
Artifact Management, Risk Management, Identity Access Management,
Secrets Management, Encryption, Governance, Risk and Compliance,
Monitoring and Logging, Incident response and learning
Learning Using Outcomes
Continuous DevSecOps learning programs are implemented to meet evolving security requirements for the organization and individuals using strategies such as lunch and learns, mentoring, professional education, employee learning plans, structured training classes, Dojos, retrospective learning, gamification, and DevOps Institute SKILup Days.
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
