We may earn an affiliate commission when you visit our partners.
DevSecCon

This talk shares practices and learnings from companies with forward thinking security teams. You'll also hear practical tips and tricks from these leaders and a broader view on dev-first security.

Read more

This talk shares practices and learnings from companies with forward thinking security teams. You'll also hear practical tips and tricks from these leaders and a broader view on dev-first security.

Digital transformation, cloud and DevOps, have radically changed how we run our business and build software. Yet, security practices in most companies remain largely unchanged, and so are left behind. This talk shares practices and learnings from companies with forward thinking security teams. You'll also hear practical tips and tricks from these leaders and a broader view on dev-first security.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Dev-first Security: Learning from the Pioneers

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers cutting-edge ideas and topics like cloud computing, DevOps, and security
Geared towards security professionals, software engineers, and technical leaders
Practical tips and tricks from industry leaders with forward-thinking security teams
Taught by DevSecCon, experts in security and DevOps

Save this course

Save Dev-first Security: Learning from the Pioneers to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Dev-first Security: Learning from the Pioneers with these activities:
DevOps Refresher
Refreshes essential DevOps concepts and practices to strengthen foundation for the course.
Browse courses on DevOps
Show steps
  • Review key concepts of DevOps
  • Identify core tools and technologies used in DevOps
  • Familiarize with DevOps methodologies
DevOps Handbook
Provides insights and best practices from industry leaders in DevOps.
Show steps
  • Read through key chapters on DevOps principles
  • Identify case studies and real-world examples
  • Summarize key takeaways and apply them to understanding of DevOps
Follow DevOps Tutorials
Reinforces understanding of DevOps concepts through practical examples and hands-on practice.
Browse courses on CI/CD
Show steps
  • Identify reliable DevOps tutorial resources
  • Follow step-by-step tutorials on key DevOps topics
  • Experiment with different CI/CD tools and techniques
One other activity
Expand to see all activities and additional details
Show all four activities
DevOps Project Proposal
Applies DevOps principles to a practical scenario, enhancing understanding and solidifying knowledge.
Browse courses on CI/CD Pipeline
Show steps
  • Define a DevOps project idea
  • Research and gather requirements
  • Design and document a DevOps implementation plan
  • Outline key metrics and success criteria

Career center

Learners who complete Dev-first Security: Learning from the Pioneers will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts are responsible for identifying, assessing, and mitigating security risks to an organization's information systems. This course may be useful for Information Security Analysts who want to learn about the latest security practices and trends. The course can help Information Security Analysts understand the benefits of a dev-first security approach and how to implement it in their organizations.
DevOps Engineer
DevOps Engineers are responsible for bridging the gap between development and operations teams. This course may be useful for DevOps Engineers who want to learn about the latest security practices and trends. The course can help DevOps Engineers understand the benefits of a dev-first security approach and how to implement it in their organizations.
Security Engineer
Security Engineers are responsible for implementing and maintaining security measures to protect an organization's information systems. This course may be useful for Security Engineers who want to learn about the latest security practices and trends. The course can help Security Engineers understand the benefits of a dev-first security approach and how to implement it in their organizations.
Software Developer
Software Developers are responsible for designing, developing, and testing software applications. This course may be useful for Software Developers who want to learn about the latest security practices and trends. The course can help Software Developers understand the benefits of a dev-first security approach and how to implement it in their development processes.
Security Consultant
Security Consultants are responsible for providing security advice and guidance to organizations. This course may be useful for Security Consultants who want to learn about the latest security practices and trends. The course can help Security Consultants understand the benefits of a dev-first security approach and how to implement it in their clients' organizations.
Cloud Security Engineer
Cloud Security Engineers are responsible for securing cloud-based applications and infrastructure. This course may be useful for Cloud Security Engineers who want to learn about the latest security practices and trends. The course can help Cloud Security Engineers understand the benefits of a dev-first security approach and how to implement it in their organizations.
Security Architect
Security Architects are responsible for designing and implementing security measures to protect an organization's information systems. This course may be useful for Security Architects who want to learn about the latest security practices and trends. The course can help Security Architects understand the benefits of a dev-first security approach and how to implement it in their organizations.
Chief Information Security Officer
The Chief Information Security Officer (CISO) is responsible for developing and implementing an organization's information security strategy. This course may be useful for CISOs who want to learn about the latest security practices and trends. The course can help CISOs understand the benefits of a dev-first security approach and how to implement it in their organizations.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Dev-first Security: Learning from the Pioneers.
This practical guide is considered a classic text for software security. It provides a comprehensive overview of software security principles and best practices and is useful as a reference guide to specific security topics.
Covers a wide range of topics in security engineering, including threat modeling, risk assessment, and designing secure systems. It valuable reference for anyone working on secure software development and can provide additional depth to the course's material.
Provides a comprehensive overview of software security assessment techniques. It is particularly useful for learners interested in gaining a deeper understanding of how to identify and prevent software vulnerabilities.
Is an industry standard guide to threat modeling. It provides a step-by-step process for identifying, analyzing, and mitigating security risks throughout the software development lifecycle.
Starts by explaining the common mistakes people make when building insecure software and then explains how to apply secure coding principles in software development. It valuable reference and can help provide a foundation for understanding dev-first security principles and practices.
Provides a comprehensive overview of incident response and computer forensics techniques. It is particularly useful for learners interested in gaining a deeper understanding of how to respond to and investigate cyberattacks.
Provides a hands-on guide to penetration testing for web applications. It includes clear explanations of common web application vulnerabilities and how to exploit them.
Provides a practical hands-on approach to ethical hacking and network defense techniques. It can be useful for learners interested in gaining a deeper understanding of how attackers think and operate.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser