EC-Council Certified DevSecOps Engineer (ECDE) Training Course
The EC-Council Certified DevSecOps Engineer (ECDE) program is a practical course tailored to empower professionals with the expertise required to embed security measures throughout the DevOps lifecycle, facilitating secure software development from the initial planning phases through to deployment.
This instructor-led, live training session, available both online and onsite, targets intermediate-level software engineers and DevOps specialists aiming to incorporate security protocols into their CI/CD pipelines, thereby ensuring the delivery of compliant and secure code.
Upon completion of this training, participants will be equipped to:
- Grasp the core principles and best practices of DevSecOps.
- Secure all stages of the CI/CD pipeline through the utilization of automated tools.
- Apply secure coding standards and execute vulnerability assessments.
- Effectively prepare for the ECDE certification via practical labs and comprehensive reviews.
Course Format
- Engaging lectures and interactive discussions.
- Practical application of DevSecOps tools within simulated pipeline environments.
- Supervised exercises centered on secure development and deployment methodologies.
Customization Options
- To arrange a customized training session aligned with your team’s specific workflows or toolchains, please reach out to us.
Course Outline
Introduction to DevSecOps and the ECDE Framework
- Foundations and principles of DevSecOps.
- Security challenges inherent in DevOps environments.
- Overview of the ECDE examination and its domains.
Fostering a Secure DevOps Culture and Mindset
- Emphasizing security as a collective responsibility.
- Implementing 'shift-left' security within the SDLC.
- Aligning stakeholders and defining team roles.
Integrating Security into CI/CD Pipelines
- Securing pipelines in Jenkins, GitLab CI, and Azure DevOps.
- Managing secrets and configuring environments securely.
- Conducting secure container builds and image scanning.
Application Security in DevSecOps
- Static and dynamic application security testing (SAST/DAST).
- Scanning for vulnerabilities in open-source dependencies (SCA tools).
- Practicing secure code reviews and coding standards.
Infrastructure as Code and Cloud Security
- Securing configurations for Terraform, Ansible, and Kubernetes.
- Implementing Identity and Access Management (IAM) and policy-as-code.
- Deploying DevSecOps in hybrid and multi-cloud environments.
Monitoring, Compliance, and Incident Readiness
- Establishing security monitoring and logging within CI/CD.
- Automating compliance with standards such as NIST, ISO, and SOC 2.
- Streamlining automated remediation and incident response processes.
ECDE Exam Preparation and Final Lab
- Understanding the ECDE exam structure and preparation strategies.
- Completing a capstone DevSecOps pipeline lab.
- Engaging in knowledge checks and readiness assessments.
Summary and Next Steps
Requirements
- Familiarity with fundamental DevOps workflows and tools.
- Understanding of the software development lifecycle (SDLC).
- Knowledge of application security principles is advantageous.
Target Audience
- DevOps engineers.
- Application security specialists.
- Software developers integrating security into their pipelines.
Open Training Courses require 5+ participants.
EC-Council Certified DevSecOps Engineer (ECDE) Training Course - Booking
EC-Council Certified DevSecOps Engineer (ECDE) Training Course - Enquiry
EC-Council Certified DevSecOps Engineer (ECDE) - Consultancy Enquiry
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
The topic is current and I needed to be updated
Damilano Marco - SIAP s.r.l.
Course - Secure Developer Java (Inc OWASP)
Upcoming Courses
Related Courses
Android Security
14 HoursAndroid serves as an open platform for mobile devices, including smartphones and tablets. It offers a wide array of security features designed to simplify the development of secure software; however, it lacks certain security aspects found in other mobile platforms. This course provides a comprehensive overview of these features while highlighting critical shortcomings related to the underlying Linux environment, file system, and general setup, as well as issues concerning permissions and other Android development components.
The curriculum details common security pitfalls and vulnerabilities in both native code and Java applications, along with recommendations and best practices for avoiding and mitigating them. Many discussed issues are illustrated with real-life examples and case studies. Additionally, the course offers a brief overview of how to utilize security testing tools to uncover security-related programming bugs.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about security solutions within Android
- Gain proficiency in using various security features of the Android platform
- Obtain information on recent Java vulnerabilities specific to Android
- Learn about common coding mistakes and strategies to avoid them
- Gain insights into native code vulnerabilities on Android
- Recognize the severe consequences of insecure buffer handling in native code
- Understand architectural protection techniques and their limitations
- Access resources and further readings on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursBuilding a secure networked application can be challenging, even for developers who have previously utilized various cryptographic components like encryption and digital signatures. To help participants grasp the role and application of these cryptographic primitives, the course first establishes a strong foundation on the core requirements of secure communication—including secure acknowledgment, integrity, confidentiality, remote authentication, and anonymity. It also outlines common threats that can compromise these requirements alongside real-world mitigation strategies.
Given that cryptography is a critical component of network security, the course examines essential cryptographic algorithms, including symmetric cryptography, hashing, asymmetric cryptography, and key agreement protocols. Rather than focusing on complex mathematical theories, the material is presented from a developer's perspective, featuring typical use-case examples and practical considerations such as public key infrastructure (PKI). Additionally, security protocols across various domains of secure communication are introduced, with a detailed examination of widely adopted protocol families like IPSEC and SSL/TLS.
The course addresses common cryptographic vulnerabilities associated with specific algorithms and protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and RSA timing attacks. For each issue, practical implications and potential consequences are explained without delving into deep mathematical details.
Finally, since XML technology is central to data exchange in networked applications, the course covers XML security aspects. This includes the use of XML in web services and SOAP messages, protection mechanisms like XML Signature and XML Encryption, and potential weaknesses in these measures. XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection are also discussed.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Comprehend the requirements for secure communication
- Learn about network attacks and defenses across different OSI layers
- Gain practical knowledge of cryptography
- Understand essential security protocols
- Recognize recent attacks targeting cryptosystems
- Gain insights into recent related vulnerabilities
- Understand security concepts within web services
- Access resources and further reading materials on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursThis three-day course provides foundational knowledge on securing C/C++ code against potential exploitation by malicious actors, focusing on vulnerabilities related to memory management and input handling. It emphasizes the core principles necessary for writing robust and secure software.
Advanced Java Security
21 HoursEven seasoned Java developers often do not fully master the range of security services provided by Java, nor are they always aware of the vulnerabilities that impact web applications built with Java.
This course introduces the security components of the Java Standard Edition (JSE) and addresses security issues related to the Java Enterprise Edition (JEE) and web services. Discussions of specific services begin with the fundamentals of cryptography and secure communication. Through a series of exercises, learners explore both declarative and programmatic security techniques in JEE, alongside transport-layer and end-to-end security for web services. Participants gain hands-on experience with the discussed APIs and tools through practical exercises.
The course also covers the most common and severe programming flaws in the Java language and platform, as well as web-related vulnerabilities. Beyond typical bugs, the security vulnerabilities explored include both language-specific issues and problems arising from the runtime environment. Each vulnerability and its corresponding attack is demonstrated through easy-to-understand exercises, followed by recommended coding guidelines and mitigation strategies.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to avoid them
- Understand the security concepts of web services
- Learn to use various security features of the Java development environment
- Gain a practical understanding of cryptography
- Understand Java EE security solutions
- Learn about typical coding mistakes and how to avoid them
- Receive information about recent vulnerabilities in the Java framework
- Acquire practical knowledge in using security testing tools
- Access resources and further reading on secure coding practices
Audience
Developers
Standard Java Security
14 HoursDescription
The Java language and the Java Runtime Environment (JRE) were engineered to eliminate many of the critical security vulnerabilities commonly found in languages such as C/C++. However, software developers and architects must not only master the positive security features available within the Java ecosystem but also remain vigilant about the persistent negative security risks inherent to Java development.
To set a solid foundation for understanding the purpose and mechanics of these security components, the course begins with an overview of cryptography fundamentals. Participants then engage in hands-on practical exercises to explore and utilize the relevant APIs firsthand.
Additionally, the curriculum thoroughly examines the most frequent and severe programming flaws specific to the Java language and platform. This includes typical errors made by Java developers as well as issues unique to the language and its environment. All identified vulnerabilities and their corresponding attack vectors are illustrated through clear, easy-to-understand exercises, followed by recommended coding guidelines and effective mitigation strategies.
Participants attending this course will
- Grasp core concepts of security, IT security, and secure coding
- Discover web vulnerabilities beyond the OWASP Top Ten and learn how to prevent them
- Gain proficiency in utilizing various security features of the Java development environment
- Develop a practical understanding of cryptography
- Identify common coding mistakes and learn strategies to avoid them
- Stay informed about recent vulnerabilities within the Java framework
- Access resources and further readings on secure coding best practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursToday, a variety of programming languages allow code to be compiled for the .NET and ASP.NET frameworks. While these environments offer robust security development capabilities, developers must understand how to apply architecture- and code-level techniques to implement desired security features, prevent vulnerabilities, and limit potential exploitation.
This course aims to equip developers with the skills to prevent untrusted code from executing privileged actions, protect resources via strong authentication and authorization, manage remote procedure calls and sessions, and explore diverse implementation strategies for various functionalities through numerous hands-on exercises.
The course introduces various vulnerabilities by first examining typical programming pitfalls associated with .NET. It then discusses ASP.NET vulnerabilities, analyzing how different environment settings impact security. Furthermore, the section on ASP.NET-specific vulnerabilities addresses not only general web application security challenges but also specialized issues and attack vectors, such as ViewState attacks and string termination attacks.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding practices
- Gain insight into web vulnerabilities beyond the OWASP Top Ten and learn how to avoid them
- Learn to utilize the various security features available within the .NET development environment
- Acquire practical knowledge in using security testing tools
- Identify typical coding mistakes and understand how to avoid them
- Stay informed about recent vulnerabilities in .NET and ASP.NET
- Access sources and further readings on secure coding practices
Audience
Developers
The Secure Coding Landscape
14 HoursThis course provides an introduction to fundamental security concepts, offering a comprehensive overview of vulnerability characteristics across diverse programming languages and platforms. It elucidates methods for mitigating software security risks throughout the software development lifecycle. While avoiding deep technical intricacies, the curriculum highlights significant and prevalent vulnerabilities in various software development technologies. It also addresses the challenges inherent in security testing, presenting applicable techniques and tools to identify potential issues within code.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding practices
- Comprehend web vulnerabilities affecting both server and client sides
- Recognize the severe consequences of improper buffer handling
- Stay informed about recent vulnerabilities in development environments and frameworks
- Learn to identify typical coding mistakes and understand how to prevent them
- Understand security testing approaches and methodologies
Audience
Managers
Secure coding in PHP
21 HoursThis course equips PHP developers with the essential skills required to fortify their applications against modern Internet-based threats. By using PHP-based examples that extend beyond the OWASP Top Ten, the curriculum covers a wide range of issues including various injection attacks, script injections, vulnerabilities in PHP session handling, insecure direct object references, file upload problems, and more. PHP-related vulnerabilities are categorized into standard types such as missing or improper input validation, incorrect error and exception handling, misuse of security features, and time- or state-related issues. Specific examples discussed include attacks like open_basedir circumvention, denial-of-service via magic floats, and hash table collision attacks. Participants will become familiar with the key techniques and functions needed to mitigate these risks.
Special emphasis is placed on client-side security, addressing issues related to JavaScript, Ajax, and HTML5. The course introduces several security-related PHP extensions, such as hash, mcrypt, and OpenSSL for cryptography, as well as Ctype, ext/filter, and HTML Purifier for input validation. Best practices for hardening are covered in the context of PHP configuration (php.ini), Apache settings, and server management in general. Additionally, the course provides an overview of various security testing tools and techniques available to developers and testers, including security scanners, penetration testing tools, exploit packs, sniffers, proxy servers, fuzzing tools, and static source code analyzers.
Both the introduction of vulnerabilities and configuration practices are reinforced with hands-on exercises. These exercises demonstrate the impact of successful attacks, show how to apply mitigation techniques, and introduce the use of various extensions and tools.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to prevent them
- Gain knowledge of client-side vulnerabilities and secure coding practices
- Develop a practical understanding of cryptography
- Learn how to utilize various security features of PHP
- Identify common coding mistakes and learn how to avoid them
- Stay informed about recent vulnerabilities in the PHP framework
- Acquire practical experience in using security testing tools
- Access resources and further reading on secure coding practices
Audience
Developers
Microsoft SDL Core
14 HoursThis comprehensive SDL core training provides an in-depth look at secure software design, development, and testing practices through the lens of the Microsoft Secure Development Lifecycle (SDL). The course offers a Level 100 overview of the fundamental building blocks of the SDL, followed by design techniques aimed at detecting and resolving flaws during the early stages of the development process.
Focusing on the development phase, the curriculum covers typical security-related programming bugs in both managed and native code. It presents attack vectors for the discussed vulnerabilities alongside corresponding mitigation techniques, all illustrated through hands-on exercises that offer participants engaging, practical hacking experiences. Following an introduction to various security testing methods, the course demonstrates the effectiveness of different testing tools. Participants will gain a deep understanding of how these tools operate by applying them to previously discussed vulnerable code through practical exercises.
Upon completion of this course, participants will:
Understand the core concepts of security, IT security, and secure coding
Gain familiarity with the essential steps of the Microsoft Secure Development Lifecycle
Acquire knowledge of secure design and development practices
Learn the principles of secure implementation
Understand security testing methodologies
- Access sources and further readings on secure coding practices
Target Audience
Developers, Managers
Security Testing
14 HoursHaving gained familiarity with vulnerabilities and attack vectors, participants will explore the overarching approach and methodology for security testing, along with techniques designed to uncover specific flaws. Effective security testing begins with information gathering regarding the system under evaluation (ToC), followed by comprehensive threat modeling to identify and prioritize all potential threats. This process culminates in a risk analysis-driven test plan.
Security assessments can be integrated at various stages of the SDLC. Accordingly, the course covers design reviews, code reviews, reconnaissance, and information gathering about the system, as well as testing implementation and hardening the environment for secure deployment. Detailed introductions to numerous security testing techniques are provided, including taint analysis, heuristics-based code review, static code analysis, dynamic web vulnerability testing, and fuzzing. A variety of tools capable of automating the security evaluation of software products are introduced, supported by hands-on exercises where participants execute these tools to analyze previously discussed vulnerable code. Additionally, real-world case studies are utilized to deepen understanding of diverse vulnerability types.
This course equips testers and QA professionals with the ability to effectively plan and execute security tests, select and utilize the most suitable tools and techniques to detect even concealed security flaws. The practical skills acquired can be immediately applied in professional settings the following day.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and understand how to mitigate them
- Study client-side vulnerabilities and secure coding practices
- Understand security testing approaches and methodologies
- Acquire practical knowledge in employing security testing techniques and tools
- Access resources and further reading materials on secure coding practices
Audience
Developers, Testers
Secure Web Application Development and Testing
21 HoursProtecting applications accessible via the web demands security professionals who are consistently informed about current attack methods and trends. While a wide array of technologies and environments facilitate comfortable web application development, it is crucial to recognize not only platform-specific security issues but also general vulnerabilities that persist regardless of the development tools used.
This course provides an overview of applicable security solutions for web applications, with a particular emphasis on understanding key cryptographic approaches. We will explore various web application vulnerabilities on both the server side (aligned with the OWASP Top Ten) and the client side, demonstrating relevant attacks alongside recommended coding techniques and mitigation strategies to prevent associated problems. The topic of secure coding concludes with a discussion of common security-related programming errors, such as flaws in input validation, misuse of security features, and poor code quality.
Testing plays a critical role in ensuring the security and robustness of web applications. Approaches range from high-level auditing and penetration testing to ethical hacking to uncover vulnerabilities of all types. However, to go beyond easily discoverable 'low-hanging fruits,' security testing must be meticulously planned and executed. Remember that while security testers must ideally identify all bugs to protect a system, an adversary needs to find only one exploitable vulnerability to gain access.
Practical exercises will deepen your understanding of web application vulnerabilities, programming mistakes, and, most importantly, mitigation techniques. Through hands-on experience with a variety of testing tools—including security scanners, sniffers, proxy servers, fuzzing tools, and static source code analyzers—this course equips you with essential practical skills ready for immediate application in the workplace.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to avoid them
- Gain knowledge of client-side vulnerabilities and secure coding practices
- Develop a practical understanding of cryptography
- Comprehend security testing approaches and methodologies
- Acquire practical knowledge in using security testing techniques and tools
- Stay informed about recent vulnerabilities across various platforms, frameworks, and libraries
- Receive resources and further readings on secure coding practices
Audience
Developers, Testers
DevOps Security: Creating a DevOps Security Strategy
7 HoursIn this instructor-led, live course in South Korea, participants will learn how to formulate an effective security strategy to address the challenges of DevOps security.
Ethical Hacking and Countermeasures
35 HoursDescription:
This course immerses students in an interactive learning environment, demonstrating how to scan, test, exploit, and secure their own systems. The lab-intensive setting provides in-depth knowledge and hands-on experience with essential, modern security systems. Participants start by understanding perimeter defenses, then proceed to scan and attack their own networks—ensuring no real networks are compromised. They then explore how intruders escalate privileges and learn the necessary steps to secure a system. Additionally, the curriculum covers Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation.
Target Audience:
This course is highly beneficial for security officers, auditors, security professionals, site administrators, and anyone concerned with maintaining the integrity of network infrastructure.
How to Write Secure Code
35 HoursThis Course in South Korea aims to assist in the following:
- Help Developers master the techniques of writing Secure Code
- Help Software Testers assess application security before deployment to the production environment
- Help Software Architects understand the risks associated with applications
- Help Team Leaders establish security baselines for developers
- Help Web Masters configure Servers to prevent misconfigurations
Secure Developer Java (Inc OWASP)
21 HoursThis course explores secure coding principles and practices for Java, utilizing the testing methodology of the Open Web Application Security Project (OWASP). The OWASP community is an online hub dedicated to providing freely accessible articles, methodologies, documentation, tools, and technologies focused on web application security.