*We know each team has their own needs and specifications. That is why we can modify the training outline per need.
Module 1: DevSecOps fundamentals and pipeline design
- Map threats to stages commit, build, test, release, deploy
- Define trust boundaries for source, CI, registry, and runtime
- Choose guardrails vs gates and set risk based policies
- Build a minimal security bill of materials for your pipeline
Module 2: Source level checks that scale
- Secrets detection and pre commit hygiene
- Static analysis and linting with meaningful baselines
- Dependency risk management SCA, license flags, and update strategy
- Pull request patterns code owners, required checks, and branch protection
Module 3: From build to image with integrity
- Container image hardening minimal base, user, and packages
- Image scanning and policy evaluation before push
- SBOM generation formats and storage
- Artifact signing and provenance verification in CI
Module 4: Infrastructure and configuration as code
- IaC scanning for cloud and Kubernetes misconfigurations
- Policy as code for controls in CI or CD
- Template libraries and golden paths for teams
- Drift detection basics and remediation options
Module 5: Secure releases and environment controls
- Promotion flows dev to prod with scoped credentials
- Secrets management rotation, short lived tokens, workload identities
- Runner and agent hardening isolation, network egress, and caching
- Release approvals tied to evidence from checks
Module 6: Runtime protection and feedback
- Admission controls and signed image verification
- Runtime alerts from auth failures, policy denials, and anomalous calls
- Log and trace enrichment to speed investigation
- Feed findings back to backlog and templates
Module 7: Metrics, dashboards, and governance
- Lead indicators pass rates, time to fix, coverage of checks
- Risk scoring for services and portfolios
- Exception handling with expiry and owner accountability
- Simple program dashboard for teams and executives
Module 8: Roadmap and adoption plan
- Prioritize gaps by impact and effort
- Phased rollout patterns and enablement kits
- Shared libraries, reusable workflows, and reference repos
- Ninety day plan with clear outcomes and owners