Practical DevSecOps - Hands-on DevSecOps Certification and Training.

Trusted by 10,000+ Learners

Certified Software Supply Chain Security ExpertTM

Master the art of securing modern software supply chains from code to cloud. Implement frameworks like NIST SSDF and SLSA while defending code repositories, container registries, Kubernetes clusters, and cloud environments. Deploy SBOM scanning, artifact signing, and CI/CD security

Monitor iconSelf-paced learning

Globe iconBrowser based lab access

Headset icon24/7 Instructor support

Monitor iconSelf-paced learning mode

Globe iconBrowser based lab access

Headset icon24/7 Instructor support

Monitor iconSelf-paced learning mode

Globe iconBrowser based lab access

Headset icon24/7 Instructor support

Video thumbnail

Trusted by top companies across industries, empowering thousands of professionals worldwide. Join the ranks of security leaders

Course Chapters

Loading chapters...

Prerequisites

  1. Course participants should have knowledge of running basic Linux commands like ls, cd, mkdir, etc.,
  2. Basic knowledge of Git, CI/CD pipelines, containers, and Cloud Platforms.
  3. A good understanding of OWASP Top 10 vulnerabilities.
  4. Familiarity with any scripting language like Python, Golang, or ruby helps. However, it’s not a necessity.

Chapter 1: Introduction to Supply Chain Security

  1. Course Introduction (About the course, syllabus, and how to approach it) 
  2. About Certification and how to approach it
  3. Course Lab Environment
  4. Lifetime course support (Mattermost)
  5. An overview of the Supply Chain Security
  6. Supply Chain Security Building Blocks
    1. Code Creation
      1. Source Code Management (SCM)
      2. Internal and external (third-party) software inventory
      3. Build system (CI/CD)
      4. Application
    2. Containers
    3. Clusters
    4. Cloud
  7. Threat Model of Software Supply Chain
    1. Overview of Code Creation (SCM, CI/CD and Application)
    2. Overview of Containers
    3. Overview of Clusters
    4. Overview of Cloud
  8. Evolution of Software Supply Chain Security
  9. Hands-on Exercise:
    1. Learn how to use our browser-based lab environment
    2. How CI/CD Works
    3. Working with Gitlab CI/CD
    4. Understanding Stages in CI/CD Pipelines
    5. Continuous Deployment
    6. How the Equifax Hack Happened

Chapter 2: Attacking Code and Application Supply Chain

  1. Introduction to code supply chain
  2. Code creation process and systems involved
    1. Source code management (git, svn)
    2. Package managers
    3. Build and CI/CD systems
  3. Attacks on SCM systems
    1. Breaking out of restricted Git shells
    2. Git servers leaking confidential information
    3. Exploiting pre-commit hooks
    4. Repo Jacking
    5. Executing Arbitrary Code With Git Commands
    6. Risks of unencrypted Git traffic
    7. Insufficient Authentication In Git Servers
  4. Supply Chain Attacks on package managers
    1. Magecart attack in an Airways
    2. Supply Chain Attacks on CDNs
    3. Bypassing security mechanisms like CSP
    4. Typo-squatting techniques
    5. Combosquatting
    6. Brandjacking
    7. Dependency confusion
    8. Abusing IDE behaviors through dependency confusion
    9. Package Masquerading
    10. Abusing Generative AI for package masquerading
  5. Attacks on Build and CI/CD Systems
    1. Poisoning build pipelines for complete pwnage
    2. Manual code reviews and sneaking PR/MR
    3. Abusing webhooks to compromise CI/CD systems
    4. Cross Build Injection (XBI) Attacks
    5. Misconfigured Github Actions
  6. Attacks on Application Side
    1. Injection attacks
    2. Cross Site Scripting (XSS)
    3. Server Side Request Forgery
  7. Real-World case studies of code supply chain attack
    1. Stealing environment variables from build servers
    2. Exposing private source code on GitHub
    3. Leaking source code of patented technologies
    4. Stolen code-sign certificates or signed malicious apps
  8. Best practices for securing application supply chain
    1. SBOMs
    2. Code Signing and Commit Signing
    3. Artifact Signing
    4. Dependency Hashing
    5. Dependency Pinning
    6. Defending GitHub Actions With Pinning
  9. Technologies and solutions for securing applications
    1. SCA
    2. SAST
    3. DAST
    4. Fuzz Testing
  10. Hands-on Exercises:
    1. Dependency confusion
    2. GitLab privilege escalation
    3. Git commit spoofing
    4. Git commit signing
    5. Typosquatting dependency
    6. How the Codecov attack happened
    7. Working with pre-commit hooks
    8. Exploiting pre-commit hooks
    9. Software Component Analysis (SCA)
    10. Static Application Security Testing (SAST)
    11. SCA/SAST using pre-commit hooks
    12. Dynamic Analysis

Chapter 3: Attacking Container Supply Chain

  1. Introduction to container technology
    1. What is a container
    2. Basics of container
  2. Ways to interact with containers ecosystem
  3. Attack surface of containers and supply chain risks
    1. Overview of container security
    2. Attack surface of the container ecosystem
    3. Attack surface analysis using native and third party tools
      1. Attack surface analysis with native tools
      2. Kernel features: Namespaces, Cgroups, Capabilities
  4. Attacking Container Supply Chain ecosystem
    1. Malicious images
    2. Insecure container registry
    3. Attacking through container misconfigurations
  5. Best practices for securing container applications
    1. Container Image Security
      1. Distroless and scratch image
      2. Multi-stage builds
    2. Securing Docker daemon
  6. Technologies and solutions for securing containerized applications
    1. Docker host security configurations
      1. Seccomp
      2. Apparmour
      3. Image signing and Content Trust
  7. Hands-on Exercises:
    1. Working with docker command
    2. Creating container snapshots
    3. Malicious container image
    4. Backdooring docker image
    5. Attacking docker registry
    6. Exploiting containerized apps
    7. Unsecured docker daemon
    8. Minimize docker security misconfigurations
    9. Build a secure, miniature image to minimize attack footprint
    10. Typosquatting attack in docker image
    11. Backdooring docker image
    12. Malicious container image

Chapter 4: Attacking Kubernetes/Cluster Supply Chain

  1. Microservices and Kubernetes
    1. Introduction to Microservices Architecture
    2. Introduction to Kubernetes Architecture
  2. Core Components of Kubernetes
  3. Supply Chain Threats for a cluster
  4. Kubernetes Package Manager
    1. Helm and its security
    2. Understanding Helm charts workflow
    3. Creating Helm Charts
  5. Abusing Kubernetes Request Pipeline
    1. Authentication, Authorization, and Admission Controllers
    2. Attacks on Admission Controllers and webhooks
    3. Insecure RBAC rules
  6. Common Attack Vectors in Kubernetes Clusters
  7. Technologies and solutions for securing container orchestration
    1. Static analysis of Kubernetes clusters
    2. Dynamic analysis and runtime security of Kubernetes clusters
  8. Hands-On Exercises:
    1. Kubernetes basic commands
    2. Working with Kubernetes
    3. Kuberntes secrets
    4. Kubernetes service accounts
    5. Kubernetes networking using Calico
    6. Reconnaissance using Kube-hunter
    7. Stealing Kubernetes secrets
    8. Exploiting Kubelet API
    9. Privileged pods in Kubernetes
    10. Sniffing Kubernetes network traffic
    11. Kubernetes image scanning
    12. Static analysis of Kubernetes manifests

Chapter 5: Attacking Cloud Supply Chain

  1. Introduction to Cloud Ecosystem (Public, On-Premise)
  2. Cloud Attack Surface and Threat Matrix
  3. Shared Security Model of the Cloud
  4. Attack Vectors in AWS
    1. Misconfigurations (exposed secrets, metadata service, etc.)
    2. Attacking Managed Services Like S3, CloudFront CDN
    3. Attacking Serverless Computing
    4. Attacking Application Deployment Services
  5. Attack Vectors in Azure
    1. Misconfigurations (exposed secrets, metadata services, etc.)
    2. Attacking Azure Blob storage, Azure Application Gateway
    3. Attacking Azure Functions
    4. Attacking Web Apps
  6. Attack Vectors in GCP
    1. Misconfigurations (exposed secrets, metadata services, etc.)
    2. Attacking Google Cloud Storage GCS, Cloud CDN
    3. Attacking Google Cloud Functions
    4. Attacking Google Kubernetes Engine
  7. Best Practices for Securing the Cloud

Chapter 6: Common Defenses Against Supply Chain Attacks

  1. Prove the sanity of the software components using Cryptography
    1. Code Signing
    2. Component Signing
    3. Artifact signing
    4. The Update Framework
  2. Evaluate dependencies before use
    1. Analyze the security and compliance of dependencies
    2. Implement integrity checks or policies
  3. Implement Change Control
    1. Protected Branches
    2. Licensed Code
    3. Configuration management and change control
  4. Create asset Inventory
  5. Generate a Software Bill Of Materials
    1. Application SBOM
    2. Container SBOM
    3. Hosts SBOM
  6. Code Isolation and Sandboxing
  7. Automation of Common Controls in CI/CD
    1. Software Component Analysis of Code, and Containers
    2. Static Security Analysis of Application Code, Infrastructure as Code
    3. Dynamic Security Analysis of Applications, APIs, Containers, and Clusters
    4. Detecting Unexpected Behaviors Through Fuzz Testing
  8. Compliance and Governance of Supply Chain Risk
  9. Hands-On Exercises:
    1. Generate the SBOM for Application using Syft
    2. Generate the SBOM for Docker Image using Syft
    3. Create an SBOM with Tern
    4. Identify malicious Package using guarddog
    5. Finding Risky Packages using packj
    6. Secrets Scanning using Trivy
    7. Secrets Scanning using TruffleHog
    8. False Positive Analysis (FPA)
    9. Container Registry using Harbor
    10. Container Vulnerability Scanning using Snyk
    11. Scanning Docker for Vulnerabilities with Trivy
    12. Signing Container Images for Trust
    13. Container Malware Scanning using YaraHunter
    14. Find Misconfigured RBAC Using KubiScan
    15. Finding Misconfigurations Using Kubescape
    16. Finding Helm Charts Misconfigurations using Kubescape
    17. How to Embed Syft into CI/CD pipeline
    18. Scan SBOM for Vulnerabilities using bomber
    19. Implement SAST as part DevOps pipelines
    20. Implement DAST as part DevOps pipelines

Chapter 7: Managing a Secure Software Supply Chain Program

  1. Problems with current Supply Chain Attack Visibility
    1. Detection of only known vulnerabilities
    2. Detection of unknown vulnerabilities
  2. Creating a vetting process for software components (Commercial, Open Source, Third Party, and Proprietary Code) used throughout SDLC
  3. Automation of vetting and third-party code
  4. Software Supply Chain Industry Standards and Best Practices
    1. NIST C-SRM or SLSA
    2. NIST SSDF
    3. Software Component Verification Standard (SCVS)
    4. Secure Supply Chain Consumption Framework (S2C2F)
    5. Supply Chain Integrity Model
    6. Software Supply Chain Best Practices
    7. SBOM
    8. CycloneDX
    9. OpenSSF  – Automated
  5. Core Infrastructure Initiative  – Self Assessment
  6. Hands-on Exercises:
    1. Achieving SLSA Level 1 using GitLab
    2. Achieving SLSA Level 2 using GitLab
    3. Establish a vetting process for open-source components
    4. Working with Defect Dojo
    5. Vulnerability Management With DefectDojo
    6. Handling Dependency Hell

Practical DevSecOps Certification Process

  1. After completing the course, you can schedule the CSSE exam on your preferred date.
  2. Process of achieving Practical DevSecOps CSSE Certification can be found here.

    Become a Software Supply Chain Security Expert in 60 Days

    CSSE-image

    What you’ll learn from the Certified
    Software Supply Chain Security Expert?

    Supply Chain Attack Defense

    • Protect source code and container registries
    • Secure Kubernetes clusters and cloud systems
    • Prevent SolarWinds-style infrastructure attacks

    Vulnerability Detection and Scanning

    • Detect dependency confusion attacks early
    • Scan CI/CD pipelines for vulnerabilities
    • Generate SBOMs to track component risks

    DevSecOps Security Implementation

    • Build security from repository to production
    • Secure Git and GitHub Actions workflows
    • Implement automated security controls

    Security Framework Compliance

    • Apply NIST SSDF, CIS, and SLSA frameworks
    • Implement SLSA security controls
    • Achieve measurable security maturity

    Enterprise Risk Management

    • Build supply chain risk frameworks
    • Achieve NIST CSF compliance standards
    • Align security with business objectives

    Third-Party and OSS Security

    • Assess vendor and open-source risks
    • Secure contractor development access
    • Validate Docker images and dependencies

    We have provided training and presented at numerous industry events.

    blackhat
    owasp
    besides
    brucon
    HITB_Logo 1

    Benefits of Enrolling in the Practical DevSecOps Courses

    Master today’s security challenges with our updated curriculum and hands-on labs, preparing you for real-world threats.

    Browser-based lab

    Access all tools and exercise directly in your browser. Enjoy a practical, hassle-free learning experience - no downloads or installations needed!

    Explore commands with our new AI-Powered 'Explain to me' feature

    Gain detailed insights into any command with our AI-powered feature, designed to enhance your understanding and accelerate your learning.

    Master cutting-edge tools

    Enhance your security skills through hands-on experience with the latest industry tools in our labs. Get equipped for real-world applications and stay ahead of industry changes.

    Become a Software Supply Chain Security Expert in 60 Days

    Hear from our learners

    Explore the global impact of our Practical DevSecOps Certifications through our learners’ testimonials.

    ★★★★★

    It’s been almost a year since I last completed extracurricular training with certification.

    This time I was drawn to PDSO’s Supply Chain Security course as it is aligned with recent projects and initiatives…..

    Eric Kmetz
    Eric Kmetz
    Senior Security Engineer at Frontdoor…

    ★★★★★

    I love the Practical DevSecOps Institute courses, as they strike the perfect balance between theory and practice, plus they have labs featuring different technologies.

    I’ve currently taken CDP, CDE, CTMP, CSSE, a…

    Trustpilot Review
    Alberto
    Trustpilot Review

    ★★★★★

    Whether you are just bootstrapping your Supply Chain Security knowledge or working towards increasing the maturity of your org’s processes this course is highly recommended!

    As with most PDSO courses, this was jam…

    Trustpilot Review
    Customer
    Trustpilot Review

    ★★★★★

    The CSSE certification exam was thorough, touching on all major point of supply chain security.

    The course content was very informative and the labs educative. 10/10 would recommend…

    Trustpilot Review
    Catherine Kamau
    Trustpilot Review

    ★★★★★

    I am pleased to share my new Software Supply Chain Security Expert certification.

    Thanks, Semgrep Brian Abad Bharatharajan Pudugramam, for trusting me…

    Sebastián Revuelta
    Sebastián Revuelta
    Customer Success Engineer | SAST | S…

    ★★★★★

    Excellent course with well-structured material! I especially appreciated the hands on labs, well done.

    This course provides all the essential knowledge needed to implement supply chain security…

    Alfredo Raimondo
    Beatrice Mwangi
    Trustpilot Review

    ★★★★★

    I’m thrilled to share that I have officially become a Certified Cloud Native Security Expert! 🎉

    Wide range of material. Interesting exam. Well-spent time.
    Highly recommend! 😊 ….

    Filip KarczewskiFilip Karczewski
    Filip KarczewskiFilip Karczewski
    Penetration Tester | Ex-Accenture…

    ★★★★★

    I finally got my hashtag#PracticalDevSecOps Certified Cloud Native Security Expert (CCNSE).

    It was a very nice experience folks at hashtag#PracticalDevSecOps specially @Raja Shekar go above and beyond so…

    Manuel LR
    Manuel LR
    Cloud Security Architect at Backblaze

    ★★★★★

    Achievement unlocked : Cloud native security certification

    I’m thrilled to share that I’ve successfully passed the Certified Cloud Native Security Expert (CCNSE) by Practical DevSecOps…

    Juhi Singh
    Juhi Singh
    Manager Information Security @ adidas…

    ★★★★★

    🎉 I’m excited to announce that I’ve earned the **Certified Cloud-Native Security Expert (CCNSE)** certification from Practical DevSecOps! 🛡️☁️

    This comprehensive certification provided in-depth knowledge and hands-on experience…

    Marcos Martín Gutiérrez
    Marcos Martín Gutiérrez
    Cybersecurity Engineer | Master‘s Deg…

    ★★★★★

    🎉 I’m thrilled to announce that I’ve officially earned my Certified Cloud Native Security Engineer (CCNSE) certification!

    🛡️ This certification has been instrumental in solidifying my expertise in critical…

    Matias Echechurre
    Matias Echechurre
    DevSecOps/Cloud Engineer | Project…

    ★★★★★

    I’m excited to share that I’ve passed the Certified Cloud Native Security certification from Practical DevSecOps!

    This course was an eye-opener, packed with hands-on labs and engaging video lessons. We…

    Nancy Wairimu
    Nancy Wairimu
    Application security Engineer &…

    Frequently asked questions

    What are the prerequisites required before enrolling in the Software Supply Chain Security certification Course?

    Students need to know basic Linux commands, Git, CI/CD pipelines, containers, cloud platforms, and OWASP Top 10 vulnerabilities. Python scripting knowledge helps but remains optional.

    What’s included in the Software Supply Chain Security course package?

    3-years of access to the videos and checklists, 60 days of browser-based labs, PDF Manual, 24/7 student support, and one exam attempt.

    Do the labs for the course start immediately after enrollment?

    No, the course doesn’t start automatically after you enroll. You’ll choose your preferred start date after completing your purchase. Once your selected start date arrives, we’ll provide access to all course materials and resources.

    Does the course come with CPE points?

    Yes, the course comes with 36 hours of CPE points.

    What is the exam format?

    You must solve 5 challenges within 6 hours during this task-oriented exam. After completing the challenges, you have 24 additional hours to write and submit your report for evaluation. For more information, visit this link.

    Should I go to an exam center, or is the exam online?

    Yes, this is an online exam. You can take it from your home or office without traveling to a testing center.

    How long is the Software Supply Chain Security Expert Certification Valid?

    Once you earn it, the certification remains valid for a lifetime, hence no renewal requirements.

    What Salary Jump Can the Certified Software Supply Chain Security Course Deliver?

    The salary jump is pretty incredible—you go from making $80,000–$110,000 to earning $139,000–$174,000. We’re talking about an extra $60,000+ in your pocket every year.

    Why such a huge increase? Simple—this is the first certification ever created for software supply chain security, and supply chain attacks are absolutely exploding right now. Remember SolarWinds? That’s just the tip of the iceberg. Every company is panicking about being the next victim, but there’s almost nobody who actually knows how to prevent these attacks.

    Software supply chain security is ridiculously specialized. You need to understand dependencies, third-party risks, how to secure the entire pipeline from development to deployment—it’s complex stuff that most security professionals don’t even touch. That’s exactly why it pays so well.

    If you’re a Security Engineer, AppSec Professional, Security Architect, or DevOps professional,  this certification transforms you into one of the only people who can solve a problem that terrifies every CEO. The market’s growing from $2.16 billion to over $4 billion in the next decade, but right now? There are barely any certified experts to hire.

    Why Certified Software Supply Chain Security Course?

    The Certified Software Supply Chain Security Expert Course delivers complete protection against emerging software supply chain threats across the entire software ecosystem. We deliver practical training that spans code creation, containers, Kubernetes clusters, and cloud environments through intensive hands-on labs and 50+ guided exercises based on actual real-world attacks – setting us apart from other training programs.

    We align with industry frameworks like SLSA, OWASP SCVS, and NIST while offering student support through our dedicated Mattermost community. Organizations choose us to develop internal expertise in:

    • Identifying advanced supply chain vulnerabilities
    • Implementing security controls at each layer
    • Automating security verification in CI/CD pipelines
    • Creating effective risk management programs

    Transform your Organizations into software supply chain security experts and safeguard your enterprise from today’s most dangerous attacks. 

    We also offer Instructor-Led Training (ILT) for enterprises

    Unmatched practical focus

    70% hands-on labs for Mastering real-world scenario’s.

    Expert-crafted curriculum

    Get real-world insights from the experienced Security Experts.

    Practical exam

    Take a 6-hour examination to show what you have learned.

    24/7 expert support

    Unbeatable guidance throughout your learning journey.
    future-proof-sec-img2

    Future-Proof Your Career with Software Supply Chain Security Training

    Unlock your potential with Software Supply Chain Security Training! Our Certified Software Supply Chain Security Expert Course equips you with job-ready skills. Conquer the 6-hour exam with confidence and open doors to exciting opportunities and Challenges.