• Welcome, objectives and chapter journey
    2026/03/24
    Welcome to the course 'CyberSecurity and DevSecOps Expert: Develop, Pentest, and Deploy Secure Applications'. This introductory chapter is your starting point. Before diving into technical tools, attack techniques, or secure deployment pipelines, it ...
    続きを読む 一部表示
    15 分
  • Essential vocabulary: security, threat, vulnerability, risk
    2026/03/24
    Welcome to this first foundational lesson. Before diving into technical tools, penetration testing techniques, or secure development practices, you need to master the vocabulary that structures all of cybersecurity. These words — security, threat, vu...
    続きを読む 一部表示
    15 分
  • Workshop: associate each term with a concrete case
    2026/03/25
    **Theoretical Recap** Before diving into the workshop, let's consolidate the four core vocabulary terms you encountered in the previous lesson. A **threat** is any potential event or actor that could cause harm to a system — for example, a hacker att...
    続きを読む 一部表示
    15 分
  • The CIA pillars: confidentiality, integrity, availability
    2026/03/26
    Before diving into the technical world of cybersecurity and secure application development, every professional in this field must internalize a fundamental framework: the three pillars known as the CIA triad. These three pillars are Confidentiality, ...
    続きを読む 一部表示
    15 分
  • Workshop: identifying the CIA pillar under threat
    2026/03/26
    **Theoretical Recap** Before diving into the workshop, let's consolidate the essential framework you need. The CIA Triad is the cornerstone model of information security, composed of three pillars: Confidentiality, Integrity, and Availability. Confid...
    続きを読む 一部表示
    15 分
  • Workshop: Creating your own threat examples
    2026/03/27
    THEORETICAL RECAP Before diving into the workshop, let's consolidate what you have covered so far. Four core concepts form the backbone of cybersecurity thinking: security (the overall state of protection of systems and data), threat (any potential e...
    続きを読む 一部表示
    15 分
  • Common web threats presented simply
    2026/03/28
    In the previous activities, you built a solid foundation: you mastered the core vocabulary of cybersecurity (security, threat, vulnerability, risk), and you explored the three fundamental pillars that any security approach must protect: confidentiali...
    続きを読む 一部表示
    15 分
  • Workshop: recognize the threat on a screenshot
    2026/03/29
    **Theoretical Recap** Before diving into the workshop, let's consolidate what you have covered so far. In cybersecurity, a threat is any potential event or action that could exploit a vulnerability to cause harm to an information system. A vulnerabil...
    続きを読む 一部表示
    15 分