
Overview
Overview
COURSE DESCRIPTION
DevSecOps and AWS Cloud Security Engineering

Market Demand for DevSecOps
- The global DevSecOps market was valued at approximately USD $8.84 billion in 2024 and is projected to grow to USD $20.24 billion by 2030, representing a Compound Annual Growth Rate (CAGR) of about 13.2%. Grand View Research
- Some industry sources estimate even higher growth, with a projected CAGR of ~24.1% from 2021–2028, and a potential market size of USD $41.66 billion by 2030. StrongDM+1
- The demand for DevSecOps talent is rising faster than traditional DevOps, driven by the increasing need to “shift security left” and integrate automated security into CI/CD workflows. Forbes+1
- Survey data indicates a critical skills gap: many organizations report difficulty finding professionals with combined development + security + operations expertise. Brokee
Course Features
- Lectures 70
- Quiz 0
- Duration 10 weeks
- Skill level All levels
- Language English
- Students 52
- Assessments Yes
Curriculum
Curriculum
Curriculum
- 13 Sections
- 70 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- WEEK 1: INTRODCUTION TO CYBER SECURITY4
- Week 2: INTRODUCTION TO NETWORK5
- INTRODUCTION TO LINUX OS7
- 3.1The Linux Community and a Career in Open Source
- 3.2Finding Your Way on a Linux System
- 3.3The Power of the Command Line
- 3.4The Linux Operating System
- 3.5Security and File Permissions
- 3.6CompTIA Security+ Alignment: Architecture, Identity Management, Operations
- 3.7Hands-on Lab: Configuring firewalls, implementing IAM policies, endpoint hardening
- Week 5: DevSecOps Culture & Security Mindset7
- 4.1Module 2.1: DevOps Philosophy & Business Value
- 4.2Module 2.2: DevSecOps Evolution & Principles
- 4.3Module 2.3: Shift-Left Security Methodology
- 4.4Module 2.4: Secure Software Development Lifecycle (SDLC)
- 4.5Module 2.5: Risk Management & Compliance in DevOps
- 4.6CompTIA Security+ Alignment: Risk management, governance, compliance
- 4.7Hands-on Lab: Security requirements gathering, risk assessment exercise
- Week 6: Threats, Attacks & Vulnerabilities8
- 5.1Module 3.1: Threat Landscape & Attack Vectors
- 5.2Module 3.2: Malware Analysis & Defense
- 5.3Module 3.3: Social Engineering & Phishing Defense
- 5.4Module 3.4: Vulnerability Assessment & Management
- 5.5Module 3.5: Incident Response Fundamentals
- 5.6CompTIA Security+ Alignment: Threats, Attacks, Vulnerabilities domain
- 5.7Hands-on Lab: Malware analysis basics, vulnerability scanning, incident response simulation
- 5.8Phase 1 Project: Secure infrastructure design with threat modeling
- PHASE 2: INFRASTRUCTURE & PIPELINE SECURITY (Weeks 7-9)Goal: Implement security in modern infrastructure and CI/CD pipelines0
- Week 7: Cloud & Infrastructure Security7
- 7.1Module 4.1: Cloud Security Fundamentals (AWS/Azure/GCP Basics)
- 7.2Module 4.2: Infrastructure as Code Security (Terraform/CloudFormation)
- 7.3Module 4.3: Container Security Basics (Docker Security)
- 7.4Module 4.4: Configuration Management Security (Ansible Basics)
- 7.5Module 4.5: Secrets Management & Cryptography Implementation
- 7.6CompTIA Security+ Alignment: Cloud security, cryptography implementation
- 7.7Hands-on Lab: Deploying secure infrastructure using IaC, container scanning
- Week 8: Secure CI/CD Pipeline Implementation6
- 8.1Module 5.1: CI/CD Pipeline Fundamentals (Jenkins and GitLab CI Architecture)
- 8.2Module 5.2: Security Testing in CI/CD (SAST, SCA, and IaC Scanning)
- 8.3Module 5.3: Dynamic Security Testing (DAST and IAST Basics)
- 8.4Module 5.4: Security Gates & Quality Gates in CI/CD Pipelines
- 8.5Module 5.5: CI/CD Pipeline Security Best Practices (Credential, Artifact, and Deployment Protection)
- 8.6Hands-on Lab: Build a CI/CD pipeline with integrated security testing, enforced security gates, and secure deployment to cloud infrastructure
- Week 9: Security Monitoring & Automation8
- 9.1Module 6.1: Security Information & Event Management (SIEM) Basics
- 9.2Module 6.2: Log Management & Analysis
- 9.3Module 6.3: Security Orchestration & Response (SOAR) Introduction
- 9.4Module 6.4: Security Metrics & Dashboarding
- 9.5Module 6.5: Automated Incident Response
- 9.6CompTIA Security+ Alignment: Monitoring, analysis, incident response
- 9.7Hands-on Lab: Implementing security tools in pipeline, basic monitoring setup
- 9.8Phase 2 Project: Complete CI/CD pipeline with integrated security controls and monitoring
- PHASE 3: PRACTICAL INTEGRATION & CAPSTONE (Weeks 10-12)Goal: Integrate all concepts through practical application and portfolio development8
- 10.1Week 10: DevSecOps Integration & Toolchain Workshop
- 10.2Module 7.1: Toolchain Integration & Orchestration
- 10.3Module 7.2: Security as Code Implementation
- 10.4Module 7.3: Compliance as Code & Audit Automation
- 10.5Module 7.4: DevSecOps Maturity Assessment
- 10.6Module 7.5: Career Pathways & Certifications Overview
- 10.7Hands-on Lab: Integrating multiple tools into cohesive workflow
- 10.8Workshop: Building a complete DevSecOps toolchain
- Week 11: Capstone Project Development0
- Capstone Project: End-to-End Secure Enterprise Implementation5
- Week 12: Portfolio Development & Certification Preparation Guidance5
Instructor
Instructor
Requirements
- Students only need a laptop, internet access, and the willingness to learn hands-on each week—no prior cybersecurity or cloud experience required.
Features
- • 24-Week Structured Learning Path covering Linux, Cloud, DevOps, Security, and Kubernetes from beginner to advanced levels. • 100% Hands-On Training with real-world labs, cloud environments, and guided projects each week. • Industry-Standard Tools & Technologies including AWS, Terraform, GitHub Actions, Jenkins, Docker, Kubernetes, Splunk, OPA, Vault, CodeQL, SonarQube, Trivy, and more. • Fully Integrated DevSecOps Pipeline teaching SAST, SCA, DAST, Secrets Scanning, IaC Security, Supply Chain Security, and Compliance-as-Code. • Real Cloud Security Experience with AWS IAM, VPC, GuardDuty, Security Hub, WAF, CloudTrail, and Config. • Enterprise Security & SIEM Training using Splunk, ELK, detection engineering, MITRE ATT&CK, and threat hunting. • Policy & Compliance Automation mapped to NIST, FedRAMP, CIS Benchmarks, and Zero Trust principles. • Dedicated Career Preparation including resume review, portfolio projects, GitHub profile optimization, and interview preparation. • Final Capstone Project deploying a full end-to-end DevSecOps architecture from code → cloud → Kubernetes → monitoring. • No Prior Experience Required—beginner-friendly curriculum designed to advance students into professional DevSecOps roles.
Target audiences
- • Cloud Security Engineer • DevSecOps Engineer • Cybersecurity Engineer • Infrastructure Security Engineer

