SEC401: Security Essentials Bootcamp Style and SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling will be taught in Japanese using Japanese language course materials. All other courses will use English language course materials and be taught in English with simultaneous translation in Japanese.
As a developer who is responsible for infrastructure and security, SEC540 was very useful for a broad, comprehensive overview of what I should be looking at, as well as deep dives on how to implement the solutions.
Mindblowing!! If you are a traditional security architect, tip-toeing around the DevOps CI/CD buzzwords, get onto SEC540 which gets you into the depths of DevSecOps & sets you up for the future!!
SEC540 provides development, operations, and security professionals with a methodology to build and deliver secure infrastructure and software using DevOps and cloud services. Students will explore how the principles, practices, and tools of DevOps can improve the reliability, integrity, and security of on-premise and cloud-hosted applications.
Starting with on-premise deployments, the first two days of the course examine the Secure DevOps methodology and its implementation using lessons from successful DevOps security programs. Students will gain hands-on experience using popular open-source tools such as Puppet, Jenkins, GitLab, Vault, Grafana, and Docker to automate Configuration Management ("infrastructure as Code"), Continuous Integration (CI), Continuous Delivery (CD), containerization, micro-segmentation, automated compliance ("Compliance as Code"), and Continuous Monitoring. The lab environment starts with a CI/CD pipeline that automatically builds, tests, and deploys infrastructure and applications. Leveraging the Secure DevOps toolchain, students perform a series of labs injecting security into the CI/CD pipeline using a variety of security tools, patterns, and techniques.
After laying the DevSecOps foundation, the final three days move DevOps workloads to the cloud, build secure cloud infrastructure, and deliver secure software. SEC540 provides in-depth analysis of the Amazon Web Services (AWS) toolchain, while lightly covering comparable services in Microsoft Azure. Using the CI/CD toolchain, students build a cloud infrastructure that can host containerized applications and microservices. Hands-on exercises analyze and fix cloud infrastructure and application vulnerabilities using security services and tools such as API Gateway, Identity and Access Management (IAM), CloudFront Signing, Security Token Service (STS), Key Management Service (KMS), managed WAF services, serverless functions, CloudFormation, AWS Security Benchmark, and much more.
SEC540 Will Prepare You To:
Understand the core principles and patterns behind DevOps:
Map and implement a Continuous Delivery/Continuous Deployment pipeline:
Understand the DevSecOps methodology and toolchain:
Integrate security into production operations:
Move your DevOps workloads to the cloud:
Consume cloud services to secure cloud applications:
Automate cloud security and operations tasks:
Student Notices and Requirements:
SEC540 starts by introducing DevOps practices, principles, and tools. We will examine how DevOps works, how work is done in DevOps, and the importance of culture, collaboration, and automation.
Using case studies of DevOps "Unicorns" - the Internet tech leaders who have created the DevOps DNA - we'll consider how and why these leaders succeeded and examine the keys to their DevOps security programs.
We'll then look at Continuous Delivery, which is the DevOps automation engine. We'll explore how to build up a Continuous Delivery or Continuous Deployment pipeline, including how to fold or wire the DevSecOps security controls into the Continuous Delivery pipeline, and how to automate security checks and tests in Continuous Delivery.
CPE/CMU Credits: 8
Building on the ideas and frameworks developed in Section 1 of the course, and using modern automated configuration management tools like Puppet, Chef, and Ansible, you'll learn how secure Infrastructure as Code allows you to quickly and consistently deploy new infrastructure and manage configurations.
Because the automated CD pipeline is so critically important to DevOps, you'll also learn to secure the pipeline using a variety of defensive approaches.
As the infrastructure and application code moves to production, we'll spend the second half of the day exploring container security issues associated with tools such as Docker and Kubernetes, as well as how to protect secrets using Vault and how to build continuous security monitoring using Grafana, Graphite, and StatsD.
Finally, we'll discuss how to build compliance into Continuous Delivery, using the security controls and guardrails that have been built in the DevOps toolchain.
CPE/CMU Credits: 8
Observing DevOps principles, you'll learn to deploy infrastructure, applications, and the CI/CD toolchain into the cloud. This section starts with an overview of Amazon Web Services (AWS) and introduces the foundational tools and practices you'll need to deploy an automated infrastructure pipeline to the AWS cloud.
Students spend the second half of the day scanning and testing their cloud infrastructure code for common cloud misconfiguration vulnerabilities. Correcting and committing infrastructure code changes will trigger an automated infrastructure pipeline to harden the cloud infrastructure code.
Finally, students will explore cloud continuous integration and delivery tools, and leverage serverless computing to perform static analysis and software supply chain vulnerability scans before releasing containers into the orchestration services.
CPE/CMU Credits: 8
Introduction to the Cloud
Cloud Architecture Overview
Secure Cloud Deployment
S3 Bucket Misconfiguration
Security Scanning in CI/CD
In this section, you'll learn to leverage cloud application security services to ensure that applications have appropriate encryption, authentication, authorization, and access control, while also maintaining functional and high-availability systems.
Starting with cloud data protection, we will explore the various encryption services and how to implement secrets management in the cloud. Leveraging that knowledge, students will learn to protect static website content served by a Content Delivery Network (CDN) using private key signing.
The second half of the day explores the world of microservices, protecting APIs with an API Gateway, and deploying serverless functions to manage authorization, data entitlements, and access control.
CPE/CMU Credits: 8
Data Protection
Secure Content Delivery
Microservice Security
Serverless Security
Expanding on the foundation of the previous sections, DevSecOps practitioners shift their focus in this course section to leveraging cloud services to automate security tasks. Students start by deploying a security path to an application using blue/green environments to minimize downtime.
Next, we review deploying and configuring a cloud web application firewall with monitoring, attack detection, and active defense capabilities to catch and block bad actors. Taking this concept to the next level, students finish off the course by building custom monitoring, detection, and enforcement of cloud compliance policies and hardening guidelines.
CPE/CMU Credits: 6
Blue/Green Deployment Options
Security Automation
Security Monitoring and Compliance
Laptop Requirements
Plan to arrive early on Day 1 (8:30 AM local time) for lab preparation and setup. During this time, students can confirm that their Amazon Web Services (AWS) account is properly set up, ensure laptops have virtualization enabled, copy the lab files, and start the Linux virtual machine.
The instructor will be available to assist students with laptop prep and set-up from 8:30 - 9:00 AM. Class lecture begins at 9:00 AM (excludes vLive, Mentor, and OnDemand).
!!! IMPORTANT NOTICE !!!
It can take more than 24 hours for a new AWS free-tier account to become active. Please do the following at least one week prior to the start of class:
6. From the left navigation bar, select "Limits."
7. Verify that you have at least 5 t2.micro instances available
8. If your limits are less than 5 t2.micro instances, please start by creating a new t2.micro instance. Creating a new instance often causes the limits to increase automatically. If your limits do not automatically increase (wait 30 minutes to check again), request an increase to open a ticket with the AWS support team. More details can be found in the AWS EC2 Service Limits documentation.
BRING YOUR OWN LAPTOP CONFIGURED USING THE FOLLOWING DIRECTIONS:
A properly configured system is required for each student participating in this course. Before coming to class, carefully read and follow these instructions exactly:
Download and install VMware Workstation, VMware Fusion, or VMware Workstation Player on your system prior to the start of the class.
Mandatory Host Hardware Requirements
Mandatory Host Operating System Requirements
You must bring a 64-bit laptop with one of the following operating systems that have been verified to be compatible with course VMware image:
Mandatory Software Requirements
Prior to class, ensure that the following software is installed on the host operating system:
In summary, before beginning the course you should:
If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org.
Preparing for SEC540:
Students taking SEC540 will have the opportunity to learn and use a number of DevOps and Cloud tools during the hands-on exercises. Getting a head start on the following tools, technologies, and languages will help students enjoy their lab experience:
Running basic Git commands (clone, add, commit, push)
Using GitLab for version control
SEC540 goes well beyond traditional lectures and immerses students in hand-on application of techniques in each section. Each lab includes a step-by-step guide to learning and applying hands-on techniques, as well as a "no hints" approach for those who want to stretch their skills and see how far they can get without following the guide. This allows each student, regardless of background, to choose a level of difficulty - always with a frustration-free fallback path.
SEC540 also offers students an opportunity to participate in NetWars Bonus Challenges each day. The gamified environment allows students to compete against each other in a race to win the SEC540 Challenge Coin, while also providing more hands-on experience with the cloud and DevOps toolchain.
Courses or equivalent experiences that are prerequisites for SEC540:
"SEC540 helped me understand the complex ecosystem of DevOps. I came away with a well-rounded understanding of how the different technologies work together and how security needs to be tied into the CI/CD aspect. More than that, I found a new enthusiasm to learn and explore DevOps. Eric Johnson, our instructor was the best person to teach this course as he is a practitioner of these technologies and he very gladly gave his time to help and answer questions during the labs. The labs were very well designed to drill the concepts home." - Uday Pothakamury, Citi
"It has helped me get a better handle on the SEC DEV OPS concepts." - Fausto Franco, NYS ITS
"Definitely makes security in Dev Ops more relatable and concrete. Love that we are asked to fix issues." - Stephen Germain, Disney
"Great course! Excellent instructor! Lots of hands-on! Met my expectations definitely and I will absolutely recommend it to other people." - Sandro Blatter, SBB
"DevOps and cloud are radically changing the way that organizations design, build, deploy, and operate online systems. Leaders like Amazon, Etsy, and Netflix are able to deploy hundreds or even thousands of changes every day, continuously learning, improving, and growing - and leaving their competitors far behind. Now DevOps and the cloud are making their way from Internet 'Unicorns' and cloud providers into enterprises.
"Traditional approaches to security can't come close to keeping up with this rate of accelerated change. Engineering and operations teams that have broken down the 'walls of confusion' in their organizations are increasingly leveraging new kinds of automation, including Infrastructure as Code, Continuous Delivery and Continuous Deployment, microservices, containers, and cloud service platforms. The question is: Can security take advantage of the tools and automation to better secure its systems?
"Security must be reinvented in a DevOps and cloud world."
- Ben Allen, Jim Bird, Eric Johnson, and Frank Kim
Paid by Jan 22 | Paid by Feb 5 | Paid after Feb 5 | Options |
---|---|---|---|
6,550 USD | 6,700 USD | 6,900 USD |