
This hands-on workshop teaches both offensive exploitation and defensive hardening of CI/CD pipelines. Students build pipelines using GitHub Actions and GitLab CI while learning how attackers exploit misconfigurations such as secret exposure and insecure workflows.
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date:
Notify me when available
Description
This hands-on workshop teaches both offensive exploitation and defensive hardening of CI/CD pipelines. Students build pipelines using GitHub Actions and GitLab CI while learning how attackers exploit misconfigurations such as secret exposure and insecure workflows.
The course emphasizes attacker mindset within the software supply chain. Students will explore techniques like environment variable exfiltration, script injection, and runner lateral movement, followed by defensive mitigation strategies.
The workshop progresses into DevSecOps practices including SAST, dependency scanning, container scanning, and egress monitoring. It concludes with a multi-stage GitLab CI/CD attack chain and a capstone project building a secure pipeline.
-
System Requirements
- Kali Linux VM (provided)
- VMware, VirtualBox, or similar
- Multi-core CPU, 16GB RAM recommended
- Internet connection
- Software: Git, Go, Docker, Terraform, Ansible, AWS CLI
Syllabus
Syllabus
-
Module 1 – Environment Setup & Foundations
-
Module 2 – Data Processing & Logging
-
Module 3 – CI/CD Pipelines
-
Module 4 – Containerization
-
Module 5 – SDLC Best Practices
-
Module 6 – Webhooks & APIs
-
Module 7 – CI/CD Exploitation
-
Module 8 – CI/CD Hardening
-
Module 9 – Infrastructure as Code
-
Module 10 – Capstone Project
-
Module 11 – Advanced Attack Chains
FAQ
-
DevOps engineers
-
Security engineers and penetration testers
-
Developers implementing secure SDLC
-
System administrators managing infrastructure
-
Security researchers and CTF enthusiasts
Intermediate. The course progresses from foundational concepts to advanced attack chains.
-
Linux command-line experience
-
Basic Git knowledge
-
Understanding of HTTP/APIs
-
GitHub account
-
Ability to run a VM
-
Build and manage CI/CD pipelines
-
Exploit CI/CD vulnerabilities
-
Harden pipelines with security tools
-
Implement DevSecOps best practices
-
Design secure end-to-end pipelines
-
Understand supply chain attack techniques
About the Instructor
Phil Miller
Bio
Phil Miller joined the team at Black Hills Information Security (BHIS) in the spring of 2022 as a Security Consultant working on web application, external, and internal network testing. Prior to this role, he was an information security associate for an e-commerce B2B company. Phil chose BHIS because of the “the amazing content and fantastic quality of work that they deliver, and it’s an awesome group of talented individuals.” He loves being on a team with folks who are also passionate about their work. Outside of work, he enjoys the arts (drumming & music, drawing & painting), as well as sports (golfing, bowling, and basketball).
Related products
-
Bill McCauleyLive4 Hrs
Workshop: Foundational Application Security Training
View Course This product has multiple variants. The options may be chosen on the product page -
Markus SchoberLive16 Hrs
Ransomware Attack Simulation and Investigation for Blue Teamers
View Course -
Kevin TackettLiveOD12 Hrs
Practical OWASP TOP 10
View Course This product has multiple variants. The options may be chosen on the product page -
Andrew KrugLiveOD16 Hrs
Securing the Cloud: Foundations
View Course This product has multiple variants. The options may be chosen on the product page

