Rephonic
Artwork for CyberSecurity & DevSecOps Expert: Develop, PenTest, and Deploy Secure Applications

CyberSecurity & DevSecOps Expert: Develop, PenTest, and Deploy Secure Applications

Ilaria Digital School
Git
Devsecops
OWASP Top 10
CI/CD
Static Application Security Testing
Dynamic Application Security Testing
Software Composition Analysis
DAST
SAST
Pre-Commit Hook
CI/CD Pipeline
Git History
Shift Left
Shift Right
Open Web Application Security Project
Cryptographic Failures
Injection
Secret Detection
Github
Secret Leakage

Become a CyberSecurity & DevSecOps Specialist: Understand the risks of an application to prioritize tests and corrections; Conduct a Web/API application Pentest (recognition, tests, proofs) on an authorized perimeter; Identify and validate major vulnerabilities (auth/session, access control, access control, injections, auth/session, access control, access, injection, injection, CSRF, injections, C... more

PublishesDailyEpisodes35Founded15 days ago
Number of ListenersCategories
CoursesEducation

Listen to this Podcast

Artwork for CyberSecurity & DevSecOps Expert: Develop, PenTest, and Deploy Secure Applications

Latest Episodes

**Theoretical Recap** A vulnerability report is a structured document that communicates security findings to both technical and non-technical stakeholders. Understanding how to read and extract key information from such a report is a foundational ski... more

Understanding how to read a vulnerability report is a foundational skill for anyone entering the field of cybersecurity or DevSecOps. Whether you are reviewing a report produced by a penetration tester, an automated scanning tool, or a security team,... more

A pre-commit checklist is a structured list of security and quality checks that every developer must run — or that are automatically triggered — before any piece of code is officially committed to a shared version control repository such as Git. The ... more

## Project Overview This mini-project is the capstone activity of the INTRO chapter. Having covered Git security policies, pre-commit hooks, OWASP Top 10, CIA triad, Shift-Left/Shift-Right/Feedback Loop principles, and pipeline security mapping, you ... more

**Theoretical Recap** Integrating security tests into an existing CI/CD workflow is the operational heart of DevSecOps. The core principle is simple: security checks must not be an afterthought bolted onto the end of a pipeline — they must be embedde... more

Security in software development has undergone a profound transformation over the past two decades. Traditionally, security was treated as a final checkpoint: developers would write code, assemble an application, and only at the very end would a secu... more

**Theoretical Recap** The OWASP Top 10 is a regularly updated reference document listing the ten most critical web application security risks. It is not a checklist to mechanically tick off, but a risk map that helps teams prioritize where to focus t... more

Before diving into penetration testing techniques or setting up a secure delivery pipeline, every cybersecurity practitioner must understand what they are actually protecting against. The OWASP Top 10 is the most widely recognized reference in web ap... more

Key Facts

Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#36
Italy/Education/Courses
Apple Podcasts
#17
Brazil/Education/Courses
Apple Podcasts
#181
Brazil/Education

Top Courses Podcasts

EconTalk
EconTalkRuss Roberts
The Scriptures Are Real
The Scriptures Are RealKerry Muhlestein
Cram The Pance
Cram The PanceScott Shapiro PA-C
EMS 20/20
EMS 20/20Long Pause Media | FlightBridgeED
Think Like An Economist
Think Like An EconomistBetsey Stevenson & Justin Wolfers
The Clinical Problem Solvers
The Clinical Problem SolversThe Clinical Problem Solvers

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per EpisodeGender SkewLocation
InterestsProfessionsAge Range
Household IncomeSocial Media Reach

Frequently Asked Questions About This Podcast

What is This Podcast about and what kind of topics does it cover?

This show targets cybersecurity professionals and software engineers focused on building, testing, and deploying secure applications. Episodes consistently center on DevSecOps concepts, threat modeling, and practical security testing across CI/CD pipelines, with emphasis on shifting security left and integrating SAST, DAST, and SCA into automated workflows. Listeners are guided through hands-on exercises—from writing secure YAML pipelines to implementing pre-commit checks and secure branch policies—alongside real-world practices for secure delivery, non-regression testing, and producing actionable vulnerability reports. A notable strength is the practical, tool-oriented approach, featuring common security gates and automation, which makes i... more

Where can I find podcast stats for this podcast?

Rephonic provides a wide range of podcast stats for this podcast. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to this podcast and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does this podcast get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for this podcast, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for this podcast?

Rephonic provides comprehensive predictive audience data for this podcast, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does this podcast have?

To see how many followers or subscribers this podcast has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

How many episodes of this podcast are there?

this podcast launched 15 days ago and published 35 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact this podcast?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for this podcast?

Rephonic pulls ratings and reviews for this podcast from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for this podcast?

Rephonic provides full transcripts for episodes of this podcast. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days