
This hands-on workshop teaches both offensive exploitation and defensive hardening of CI/CD pipelines. Students build pipelines using GitHub Actions and GitLab CI while learning how attackers exploit misconfigurations such as secret exposure and insecure workflows.
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date:
Notify me when available
Description
This hands-on workshop teaches both offensive exploitation and defensive hardening of CI/CD pipelines. Students build pipelines using GitHub Actions and GitLab CI while learning how attackers exploit misconfigurations such as secret exposure and insecure workflows.
The course emphasizes attacker mindset within the software supply chain. Students will explore techniques like environment variable exfiltration, script injection, and runner lateral movement, followed by defensive mitigation strategies.
The workshop progresses into DevSecOps practices including SAST, dependency scanning, container scanning, and egress monitoring. It concludes with a multi-stage GitLab CI/CD attack chain and a capstone project building a secure pipeline.
-
System Requirements
- Kali Linux VM (provided)
- VMware, VirtualBox, or similar
- Multi-core CPU, 16GB RAM recommended
- Internet connection
- Software: Git, Go, Docker, Terraform, Ansible, AWS CLI
Syllabus
Syllabus
-
Module 1 – Environment Setup & Foundations
-
Module 2 – Data Processing & Logging
-
Module 3 – CI/CD Pipelines
-
Module 4 – Containerization
-
Module 5 – SDLC Best Practices
-
Module 6 – Webhooks & APIs
-
Module 7 – CI/CD Exploitation
-
Module 8 – CI/CD Hardening
-
Module 9 – Infrastructure as Code
-
Module 10 – Capstone Project
-
Module 11 – Advanced Attack Chains
FAQ
-
DevOps engineers
-
Security engineers and penetration testers
-
Developers implementing secure SDLC
-
System administrators managing infrastructure
-
Security researchers and CTF enthusiasts
Intermediate. The course progresses from foundational concepts to advanced attack chains.
-
Linux command-line experience
-
Basic Git knowledge
-
Understanding of HTTP/APIs
-
GitHub account
-
Ability to run a VM
-
Build and manage CI/CD pipelines
-
Exploit CI/CD vulnerabilities
-
Harden pipelines with security tools
-
Implement DevSecOps best practices
-
Design secure end-to-end pipelines
-
Understand supply chain attack techniques
About the Instructor
Phil Miller
Bio
Phil Miller joined the team at Black Hills Information Security (BHIS) in the spring of 2022 as a Security Consultant working on web application, external, and internal network testing. Prior to this role, he was an information security associate for an e-commerce B2B company. Phil chose BHIS because of the “the amazing content and fantastic quality of work that they deliver, and it’s an awesome group of talented individuals.” He loves being on a team with folks who are also passionate about their work. Outside of work, he enjoys the arts (drumming & music, drawing & painting), as well as sports (golfing, bowling, and basketball).
Related products
-
Multiple InstructorsLive16 Hrs
Assumed Compromise: A Methodology with Detections and Microsoft Sentinel
View Course -
Kevin KlingbileLiveOD16 Hrs
Defending M365 & Azure
View Course This product has multiple variants. The options may be chosen on the product pageJun 15 - Jun 16
-
Bill McCauleyLive4 Hrs
Workshop: Foundational Application Security Training
View Course This product has multiple variants. The options may be chosen on the product page -
Kevin TackettLiveOD12 Hrs
Practical OWASP TOP 10
View Course This product has multiple variants. The options may be chosen on the product page

