
Overview
Overview
COURSE DESCRIPTION
DevSecOps and AWS Cloud Security Engineering

Market Demand for DevSecOps
- The global DevSecOps market was valued at approximately USD $8.84 billion in 2024 and is projected to grow to USD $20.24 billion by 2030, representing a Compound Annual Growth Rate (CAGR) of about 13.2%. Grand View Research
- Some industry sources estimate even higher growth, with a projected CAGR of ~24.1% from 2021–2028, and a potential market size of USD $41.66 billion by 2030. StrongDM+1
- The demand for DevSecOps talent is rising faster than traditional DevOps, driven by the increasing need to “shift security left” and integrate automated security into CI/CD workflows. Forbes+1
- Survey data indicates a critical skills gap: many organizations report difficulty finding professionals with combined development + security + operations expertise. Brokee
Course Features
- Lectures 76
- Quiz 0
- Duration 10 weeks
- Skill level All levels
- Language English
- Students 50
- Assessments Yes
Curriculum
Curriculum
Curriculum
- 15 Sections
- 76 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- PHASE 0: ESSENTIAL TECHNICAL FOUNDATIONS (Weeks 1-3)Goal: Build core technical skills with CompTIA Network+ & Security+ alignment0
- Week 1: Linux Fundamentals for Security Operations5
- 2.1Module 0.1: Linux Operating System Overview (Distributions, Architecture)
- 2.2Module 0.2: Command Line Proficiency (Navigation, File Management)
- 2.3Module 0.3: User & Permission Management (Users, Groups, chmod, chown)
- 2.4Module 0.4: Process Management & Services (systemctl, service, crontab)
- 2.5Module 0.5: Basic Shell Scripting (Variables, Conditionals, Loops)
- Week 2: Networking Fundamentals (CompTIA Network+ Focus)5
- 3.1Module 0.6: Network Models & Protocols (OSI Model, TCP/IP Suite)
- 3.2Module 0.7: IP Addressing & Subnetting (IPv4, IPv6, CIDR Notation)
- 3.3Module 0.8: Network Devices & Security (Routers, Switches, Firewalls, IDS/IPS)
- 3.4Module 0.9: Network Services & Protocols (DNS, DHCP, HTTP/S, SSH, TLS)
- 3.5Module 0.10: Network Troubleshooting & Tools (ping, traceroute, netstat, Wireshark basics)
- Week 3: Programming & Security Fundamentals5
- 4.1Module 0.11: Python for Security Automation (Syntax, Data Types, Functions)
- 4.2Module 0.12: Working with APIs & Data Formats (JSON, YAML, REST APIs)
- 4.3Module 0.13: Version Control with Git (Basics: clone, commit, push, pull)
- 4.4Module 0.14: Security Principles & Cryptography Basics
- 4.5Module 0.15: Introduction to Security Frameworks (NIST, ISO 27001)
- PHASE 1: SECURITY CORE CONCEPTS (Weeks 4-6)Goal: Deep dive into security fundamentals and DevSecOps principles7
- 5.1Module 1.1: Security Architecture & Design Principles
- 5.2Module 1.2: Identity & Access Management (Authentication, Authorization, MFA)
- 5.3Module 1.3: Network Security Controls (Firewalls, VPNs, Segmentation)
- 5.4Module 1.4: Endpoint Security & Hardening
- 5.5Module 1.5: Security Operations & Monitoring
- 5.6CompTIA Security+ Alignment: Architecture, Identity Management, Operations
- 5.7Hands-on Lab: Configuring firewalls, implementing IAM policies, endpoint hardening
- Week 5: DevSecOps Culture & Security Mindset7
- 6.1Module 2.1: DevOps Philosophy & Business Value
- 6.2Module 2.2: DevSecOps Evolution & Principles
- 6.3Module 2.3: Shift-Left Security Methodology
- 6.4Module 2.4: Secure Software Development Lifecycle (SDLC)
- 6.5Module 2.5: Risk Management & Compliance in DevOps
- 6.6CompTIA Security+ Alignment: Risk management, governance, compliance
- 6.7Hands-on Lab: Security requirements gathering, risk assessment exercise
- Week 6: Threats, Attacks & Vulnerabilities8
- 7.1Module 3.1: Threat Landscape & Attack Vectors
- 7.2Module 3.2: Malware Analysis & Defense
- 7.3Module 3.3: Social Engineering & Phishing Defense
- 7.4Module 3.4: Vulnerability Assessment & Management
- 7.5Module 3.5: Incident Response Fundamentals
- 7.6CompTIA Security+ Alignment: Threats, Attacks, Vulnerabilities domain
- 7.7Hands-on Lab: Malware analysis basics, vulnerability scanning, incident response simulation
- 7.8Phase 1 Project: Secure infrastructure design with threat modeling
- PHASE 2: INFRASTRUCTURE & PIPELINE SECURITY (Weeks 7-9)Goal: Implement security in modern infrastructure and CI/CD pipelines0
- Week 7: Cloud & Infrastructure Security7
- 9.1Module 4.1: Cloud Security Fundamentals (AWS/Azure/GCP Basics)
- 9.2Module 4.2: Infrastructure as Code Security (Terraform/CloudFormation)
- 9.3Module 4.3: Container Security Basics (Docker Security)
- 9.4Module 4.4: Configuration Management Security (Ansible Basics)
- 9.5Module 4.5: Secrets Management & Cryptography Implementation
- 9.6CompTIA Security+ Alignment: Cloud security, cryptography implementation
- 9.7Hands-on Lab: Deploying secure infrastructure using IaC, container scanning
- Week 8: Secure CI/CD Pipeline Implementation6
- 10.1Module 5.1: CI/CD Pipeline Fundamentals (Jenkins and GitLab CI Architecture)
- 10.2Module 5.2: Security Testing in CI/CD (SAST, SCA, and IaC Scanning)
- 10.3Module 5.3: Dynamic Security Testing (DAST and IAST Basics)
- 10.4Module 5.4: Security Gates & Quality Gates in CI/CD Pipelines
- 10.5Module 5.5: CI/CD Pipeline Security Best Practices (Credential, Artifact, and Deployment Protection)
- 10.6Hands-on Lab: Build a CI/CD pipeline with integrated security testing, enforced security gates, and secure deployment to cloud infrastructure
- Week 9: Security Monitoring & Automation8
- 11.1Module 6.1: Security Information & Event Management (SIEM) Basics
- 11.2Module 6.2: Log Management & Analysis
- 11.3Module 6.3: Security Orchestration & Response (SOAR) Introduction
- 11.4Module 6.4: Security Metrics & Dashboarding
- 11.5Module 6.5: Automated Incident Response
- 11.6CompTIA Security+ Alignment: Monitoring, analysis, incident response
- 11.7Hands-on Lab: Implementing security tools in pipeline, basic monitoring setup
- 11.8Phase 2 Project: Complete CI/CD pipeline with integrated security controls and monitoring
- PHASE 3: PRACTICAL INTEGRATION & CAPSTONE (Weeks 10-12)Goal: Integrate all concepts through practical application and portfolio development8
- 12.1Week 10: DevSecOps Integration & Toolchain Workshop
- 12.2Module 7.1: Toolchain Integration & Orchestration
- 12.3Module 7.2: Security as Code Implementation
- 12.4Module 7.3: Compliance as Code & Audit Automation
- 12.5Module 7.4: DevSecOps Maturity Assessment
- 12.6Module 7.5: Career Pathways & Certifications Overview
- 12.7Hands-on Lab: Integrating multiple tools into cohesive workflow
- 12.8Workshop: Building a complete DevSecOps toolchain
- Week 11: Capstone Project Development0
- Capstone Project: End-to-End Secure Enterprise Implementation5
- Week 12: Portfolio Development & Certification Preparation Guidance5
Instructor
Instructor
Requirements
- Students only need a laptop, internet access, and the willingness to learn hands-on each week—no prior cybersecurity or cloud experience required.
Features
- • 24-Week Structured Learning Path covering Linux, Cloud, DevOps, Security, and Kubernetes from beginner to advanced levels. • 100% Hands-On Training with real-world labs, cloud environments, and guided projects each week. • Industry-Standard Tools & Technologies including AWS, Terraform, GitHub Actions, Jenkins, Docker, Kubernetes, Splunk, OPA, Vault, CodeQL, SonarQube, Trivy, and more. • Fully Integrated DevSecOps Pipeline teaching SAST, SCA, DAST, Secrets Scanning, IaC Security, Supply Chain Security, and Compliance-as-Code. • Real Cloud Security Experience with AWS IAM, VPC, GuardDuty, Security Hub, WAF, CloudTrail, and Config. • Enterprise Security & SIEM Training using Splunk, ELK, detection engineering, MITRE ATT&CK, and threat hunting. • Policy & Compliance Automation mapped to NIST, FedRAMP, CIS Benchmarks, and Zero Trust principles. • Dedicated Career Preparation including resume review, portfolio projects, GitHub profile optimization, and interview preparation. • Final Capstone Project deploying a full end-to-end DevSecOps architecture from code → cloud → Kubernetes → monitoring. • No Prior Experience Required—beginner-friendly curriculum designed to advance students into professional DevSecOps roles.
Target audiences
- • Cloud Security Engineer • DevSecOps Engineer • Cybersecurity Engineer • Infrastructure Security Engineer




