Overview

Certified DevSecOps Engineer (E|CDE) is a comprehensive DevSecOps certification program that helps professionals build the essential skills needed to design, develop, and maintain secure applications and infrastructure.

The E|CDE covers both on-premises and cloud-native environments (including AWS Cloud and Microsoft Azure) with 80+ labs from the creators of the world’s number one ethical hacking program, the Certified Ethical Hacker (C|EH). Designed and developed by SMEs with contributions by experienced DevSecOps professionals from around the world.

Adding security to a DevOps skill set enhances career prospects.

  • The information provided in the E|CDE course is complemented with labs to help learners hone their practical skills and become industry ready.
  • This course teaches students how to use various DevSecOps tools and create secure code throughout the software development life cycle.
  • Participants gain familiarity with DevSecOps tools that enable the secure development of software and web applications, both on premises and in the cloud.
  • The E|CDE course focuses on application DevSecOps and also provides insights into infrastructure DevSecOps.
  • The integration of today’s most popular and important tools is illustrated at each stage of the DevOps life cycle.
  • The E|CDE program helps DevSecOps engineers develop and enhance their knowledge and skills in securing applications at all stages of the DevOps pipeline.
Read more +

Prerequisites

  • Students should have an understanding of application security concepts.

Who Can Benefit From the E|CDE?

  • C|ASE-certified professionals
  • Application security professionals
  • DevOps engineers
  • Software engineers and testers
  • IT security professionals
  • Cybersecurity engineers and analysts
  • Anyone with prior knowledge of application security who wants to build their career in DevSecOps
Read more +

Objectives

  • Understand DevOps security bottlenecks and discover how the culture, philosophy, practices, and tools of DevSecOps can enhance collaboration and communication across development and operations teams.

  • Understand the DevSecOps toolchain and how to include security controls in automated DevOps pipelines.

  • Integrate Eclipse and GitHub with Jenkins to build applications.

  • Align security practices like security requirement gathering, threat modeling, and secure code reviews with development workflows.

  • Integrate threat modeling tools like Threat Dragon, ThreatModeler, and Threatspec; manage security requirements with Jira and Confluence; and use Jenkins to create a secure CI/CD pipeline.

  • Understand and implement continuous security testing with static, dynamic, and interactive application security testing and SCA tools (e.g., Snyk, SonarQube, StackHawk, Checkmarx SAST, Debricked, WhiteSource Bolt).

  • Integrate runtime application selfprotection tools like Hdiv, Sqreen, and Dynatrace that protect applications during runtime with fewer false positives and remediate known vulnerabilities.

  • Integrate SonarLint with the Eclipse and Visual Studio Code IDEs.

  • Implement tools like the JFrog IDE plugin and the Codacy platform.

  • Integrate automated security testing into a CI/CD pipeline using Amazon CloudWatch; Amazon Elastic Container Registry; and AWS CodeCommit, CodeBuild, CodePipeline, Lambda, and Security Hub.

  • Implement various automation tools and practices, including Jenkins, Bamboo, TeamCity, and Gradle.

  • Perform continuous vulnerability scans on data and product builds using automated tools like Nessus, SonarCloud, Amazon Macie, and Probely.

  • Implement penetration testing tools like gitGraber and GitMiner to secure CI/CD pipelines.

  • Use AWS and Azure tools to secure applications.

  • Integrate automated tools to identify security misconfigurations that could expose sensitive information and result in attacks.

  • Understand the concept of infrastructure as code and provision and configure infrastructure using tools like Ansible, Puppet, and Chef.

  • Audit code pushes, pipelines, and compliance using logging and monitoring tools like Sumo Logic, Datadog, Splunk, the ELK stack, and Nagios.

  • Use automated monitoring and alerting tools (e.g., Splunk, Azure Monitor, Nagios) and create a real-time alert and control system.

  • Integrate compliance-as-code tools like Cloud Custodian and the DevSec framework to ensure that organizational regulatory or compliance requirements are met without hindering production.

  • Scan and secure infrastructure using container and image scanners (Trivyand Qualys) and infrastructure security scanners (Bridgecrew and Checkov).

  • Integrate tools and practices to build continuous feedback into the DevSecOps pipeline using Jenkins and Microsoft Teams email notifications.

  • Integrate alerting tools like Opsgenie with log management and monitoring tools to enhance operations performance and security.

Read more +

Outline

MODULE 01 | Understanding DevOps Culture

MODULE 02 | Introduction to DevSecOps

MODULE 03 | DevSecOps Pipeline—Plan Stage

MODULE 04 | DevSecOps Pipeline—Code Stage

MODULE 05 | DevSecOps Pipeline—Build and Test Stage

MODULE 06 | DevSecOps Pipeline—Release and Deploy Stage

MODULE 07 | DevSecOps Pipeline—Operate and Monitor Stage

E|CDE Exam Information - EC-Council Certified DevSecOps Engineer (E|CDE) 11

  • Passing Score - 70.00%

  • Test Format - Multiple Choice

  • Availability - EC-Council Exam Portal

  • Duration - 4 hours

  • Number of Questions - 100

Read more +

What's included

  • Online exam voucher
Read more +

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
AI Security
Application Security
Cyber Blue Team
Cybersecurity Maturity Model Certification (CMMC)
Cloud Security
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
Information Security Management
NIST Pathway
Offensive Security
Privacy Professional
Reverse Engineer
Secure Coding
Security Auditor
Security Architect
Security Risk
Security Tech Generalist
Vulnerability Assessment & Penetration Testing