CyberSecurity & DevSecOps Expert: Develop, PenTest, and Deploy Secure Applications cover art

CyberSecurity & DevSecOps Expert: Develop, PenTest, and Deploy Secure Applications

CyberSecurity & DevSecOps Expert: Develop, PenTest, and Deploy Secure Applications

By: Ilaria Digital School
Listen for free

Summary

Become a CyberSecurity & DevSecOps Specialist: Understand the risks of an application to prioritize tests and corrections; Conduct a Web/API application Pentest (recognition, tests, proofs) on an authorized perimeter; Identify and validate major vulnerabilities (auth/session, access control, access control, injections, auth/session, access control, access, injection, injection, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injection); Master the main tools such as Nmap, Wireshark, Metasploit, Python scripting; Correct flaws properly and set up non-regression tests; Produce a vulnerability report; Set up a secure delivery chain: CI/CD, SAST (Static Application Security Testing), DAST (Dynamic Application Security Testing), SCA (Software Composition Analysis), SCA (Software Composition Analysis), containers.© 2026 Ilaria Digital School. Tous droits réservés. Education
Episodes
  • Welcome, objectives and chapter journey
    Mar 24 2026
    Welcome to the course 'CyberSecurity and DevSecOps Expert: Develop, Pentest, and Deploy Secure Applications'. This introductory chapter is your starting point. Before diving into technical tools, attack techniques, or secure deployment pipelines, it ...
    Show More Show Less
    15 mins
  • Essential vocabulary: security, threat, vulnerability, risk
    Mar 24 2026
    Welcome to this first foundational lesson. Before diving into technical tools, penetration testing techniques, or secure development practices, you need to master the vocabulary that structures all of cybersecurity. These words — security, threat, vu...
    Show More Show Less
    15 mins
  • Workshop: associate each term with a concrete case
    Mar 25 2026
    **Theoretical Recap** Before diving into the workshop, let's consolidate the four core vocabulary terms you encountered in the previous lesson. A **threat** is any potential event or actor that could cause harm to a system — for example, a hacker att...
    Show More Show Less
    15 mins
adbl_web_anon_alc_button_suppression_c
No reviews yet