• Welcome, objectives and chapter journey
    Mar 24 2026
    Welcome to the course 'CyberSecurity and DevSecOps Expert: Develop, Pentest, and Deploy Secure Applications'. This introductory chapter is your starting point. Before diving into technical tools, attack techniques, or secure deployment pipelines, it ...
    Show More Show Less
    15 mins
  • Essential vocabulary: security, threat, vulnerability, risk
    Mar 24 2026
    Welcome to this first foundational lesson. Before diving into technical tools, penetration testing techniques, or secure development practices, you need to master the vocabulary that structures all of cybersecurity. These words — security, threat, vu...
    Show More Show Less
    15 mins
  • Workshop: associate each term with a concrete case
    Mar 25 2026
    **Theoretical Recap** Before diving into the workshop, let's consolidate the four core vocabulary terms you encountered in the previous lesson. A **threat** is any potential event or actor that could cause harm to a system — for example, a hacker att...
    Show More Show Less
    15 mins
  • The CIA pillars: confidentiality, integrity, availability
    Mar 26 2026
    Before diving into the technical world of cybersecurity and secure application development, every professional in this field must internalize a fundamental framework: the three pillars known as the CIA triad. These three pillars are Confidentiality, ...
    Show More Show Less
    15 mins
  • Workshop: identifying the CIA pillar under threat
    Mar 26 2026
    **Theoretical Recap** Before diving into the workshop, let's consolidate the essential framework you need. The CIA Triad is the cornerstone model of information security, composed of three pillars: Confidentiality, Integrity, and Availability. Confid...
    Show More Show Less
    15 mins
  • Workshop: Creating your own threat examples
    Mar 27 2026
    THEORETICAL RECAP Before diving into the workshop, let's consolidate what you have covered so far. Four core concepts form the backbone of cybersecurity thinking: security (the overall state of protection of systems and data), threat (any potential e...
    Show More Show Less
    15 mins
  • Common web threats presented simply
    Mar 28 2026
    In the previous activities, you built a solid foundation: you mastered the core vocabulary of cybersecurity (security, threat, vulnerability, risk), and you explored the three fundamental pillars that any security approach must protect: confidentiali...
    Show More Show Less
    15 mins
  • Workshop: recognize the threat on a screenshot
    Mar 29 2026
    **Theoretical Recap** Before diving into the workshop, let's consolidate what you have covered so far. In cybersecurity, a threat is any potential event or action that could exploit a vulnerability to cause harm to an information system. A vulnerabil...
    Show More Show Less
    15 mins