Cybersecurity career intelligence
Get weekly cybersecurity career intelligence
© 2026 Bespoke Intermedia LLC
Founded by Julian Calvo, Ed.D. · Cybersecurity career intelligence · Est. 2024
Primary-source-grounded cybersecurity course
A primary-source-grounded six-module path into DevSecOps and platform-security work: shift-left, the Secure Software Development Framework, the OWASP working catalog, supply-chain integrity per SLSA, and the career ladder.
DevSecOps Fundamentals is a 6-module cybersecurity course for software engineers, platform engineers, and security practitioners moving into the seam between development and security. Every module is grounded in primary-source frameworks: NIST SP 800-218 (Secure Software Development Framework), the OWASP Top 10 (2021) and OWASP Application Security Verification Standard v4, the Supply chain Levels for Software Artifacts (SLSA) framework, the Accelerate research program (Forsgren, Humble, Kim 2018) on continuous-delivery performance, and the CIS Controls v8. The course covers the full DevSecOps stack: how to shift security left into design and CI, what static and dynamic application-security testing tools actually catch and miss, how to harden a CI/CD pipeline against attacker tampering, and how to ship a software bill of materials (SBOM) that survives a supply-chain audit. Designed by Julian Calvo, Ed.D. in Applied Learning Sciences (University of Miami, 2026).
The course sequences six modules around the secure-software lifecycle: design, code, build, test, release, and operate. Each module pairs a primary-source standard with a hands-on artifact: read the standard, apply it to a real CI pipeline, document the security review the way a platform-engineering team would expect to see it. The pedagogical pattern follows Kolb's experiential learning cycle (1984) and the Dreyfus skill acquisition model (1980): concrete pipeline configurations, structured reflection against the standard, abstract conceptualization through the controls catalog, then active experimentation in a free-tier sandbox. Every claim is cited to NIST, OWASP, SLSA, the Accelerate research program, BLS, ISC2, or peer-reviewed research. No vendor application-security-platform marketing.
Module 01 · 130 min
What 'shift-left' actually means as an operational practice, why NIST SP 800-218 codifies it as the SSDF, and how to read the framework as a working tool for a platform-engineering team rather than a marketing slogan.
Module 02 · 140 min
What the OWASP Top 10 (2021) actually covers, why ASVS is the working catalog DevSecOps engineers should care about more than the Top 10, and how to read each as a hands-on engineer.
Module 03 · 140 min
Why supply-chain attacks are the fastest-growing breach pattern, what the SLSA framework defines as integrity levels, and how to ship a software bill of materials (SBOM) that survives an audit.
Module 04 · 120 min
What controls protect a CI/CD pipeline from tampering, why long-lived API tokens are the most common compromise vector, and how to design a workload-identity model that retires them.
Module 05 · 110 min
How runtime security extends the DevSecOps program past deployment, what eBPF-based observability tools (Falco, Tetragon) actually capture, and how the platform team partners with the SOC.
Module 06 · 100 min
What the application security engineer, DevSecOps engineer, platform security engineer, and security architect ladder looks like, the credentials hiring managers price into the offer, and the BLS, ISC2, and DORA data behind compensation.
This course is for educational purposes only. It does not guarantee employment, certification pass rates, or shipped-product security outcomes. Software security is contextual; recommendations in this course must be adapted to the specific stack, threat model, and risk tolerance of the consuming organization. NIST and US Government materials cited here are public works. OWASP materials are licensed under Creative Commons Attribution-ShareAlike. SLSA is a Linux Foundation project. DecipherU is not affiliated with any standards body or platform vendor.