Close
Training
CMD+CTRL Base Camp
SI-CSC Certification
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Ed TALKS
White Papers, Tipsheets, & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Request a Demo
We’re Hiring
Blog
Course Catalog
Request a Demo
We’re Hiring
Blog
Course Catalog
Training
CMD+CTRL Base Camp
SI-CSC Certification
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Ed TALKS
White Papers, Tipsheets, & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Course Catalog
/
Subject
/
DoD Enterprise DevSecOps
DoD Enterprise DevSecOps
View All Courses
Download Course Catalog
CYB 310 – Using Cyber Supply Chain Risk Management (C-SCRM) to Mitigate Threats to IT/OT (NEW)
40 Minutes
Elite
CYB 311 – Threat Analysis with AI (NEW)
20 Minutes
Elite
DES 214 – Securing Infrastructure Architecture
30 Minutes
Advanced
DES 216 – Protecting Cloud Infrastructure
40 Minutes
Advanced
DES 218 – Protecting Microservices, Containers, and Orchestration
30 Minutes
Advanced
DES 262 – Securing Enterprise Low-Code Applications Platforms
20 Minutes
Advanced
DES 313 – Hardening a Kubernetes Cluster
20 Minutes
Elite
DES 314 – Hardening the Docker Engine
15 Minutes
Elite
DSO 201 – Fundamentals of Secure DevOps
30 Minutes
Advanced
DSO 205 – Securing the COTS Supply Chain
15 Minutes
Advanced
DSO 206 – Securing the Open Source Supply Chain
15 Minutes
Advanced
DSO 211 – Identifying Threats to Containers in a DevSecOps Framework
20 Minutes
Advanced
DSO 212 – Fundamentals of Zero Trust Security
15 Minutes
Advanced
DSO 253 – DevSecOps in the AWS Cloud
20 Minutes
Advanced
DSO 254 – DevSecOps in the Azure Cloud
20 Minutes
Advanced
DSO 256 – DevSecOps in the Google Cloud Platform
20 Minutes
Advanced
DSO 301 – Orchestrating Secure System and Service Configuration
20 Minutes
Elite
DSO 302 – Automated Security Testing
20 Minutes
Elite
DSO 303 – Automating Security Updates
20 Minutes
Elite
DSO 304 – Securing API Gateways in a DevSecOps Framework
20 Minutes
Elite
DSO 305 – Automating CI/CD Pipeline Compliance
20 Minutes
Elite
DSO 306 – Implementing Infrastructure as Code
20 Minutes
Elite
DSO 307 – Secure Secrets Management
20 Minutes
Elite
ICS 210 – ICS/SCADA Security Essentials
12 Minutes
Advanced