EC-Council • ECDE
Validates the ability to integrate security practices into DevOps pipelines and continuous delivery workflows, covering DevSecOps culture, threat modeling, secure code review, automated security testing, container security, and security monitoring throughout the software development lifecycle.
Questions
609
Duration
240 minutes
Passing Score
70%
Difficulty
AssociateLast Updated
Feb 2026
The EC-Council Certified DevSecOps Engineer (E|CDE), exam code 312-97, is a comprehensive certification that validates a professional's ability to embed security practices across the entire DevOps pipeline. The program covers all eight stages of the DevOps lifecycle — from planning and coding through building, testing, releasing, deploying, operating, and monitoring — ensuring that security is treated as a shared, continuous responsibility rather than an afterthought. Candidates learn to apply threat modeling, secure coding guidelines, static and dynamic application security testing (SAST/DAST), infrastructure as code (IaC) security, container security, and runtime monitoring using industry tools such as SonarQube, Snyk, Checkmarx, Jenkins, Terraform, and Docker Bench.
The certification is notably hands-on, featuring over 80 guided lab exercises delivered in virtual environments spanning Amazon Web Services (AWS), Microsoft Azure, and on-premises platforms. This dual focus on theoretical DevSecOps principles and practical tool-based implementation distinguishes E|CDE from more conceptual security credentials, making it one of the most lab-intensive DevSecOps certifications available. The program has been updated to incorporate AI-powered security tooling and cloud-native security patterns relevant to modern CI/CD workflows.
The E|CDE is designed for mid-career technology professionals who work at the intersection of software development, operations, and security. Primary target roles include DevOps engineers looking to formalize their security knowledge, application security specialists transitioning into DevSecOps, software engineers and QA testers responsible for secure delivery pipelines, and cybersecurity engineers or analysts who need to integrate security tooling into CI/CD workflows. Professionals holding EC-Council's Certified Application Security Engineer (CASE) credential or similar AppSec certifications will find E|CDE a natural progression.
EC-Council recommends candidates have at least two years of experience in information security, along with familiarity with SDLC concepts, automation tools, and scripting languages such as Python or PowerShell. The certification suits professionals targeting specialized roles such as DevSecOps Engineer, Cloud DevSecOps Engineer, AWS/Azure DevSecOps Engineer, or CI/CD Security Engineer.
EC-Council requires applicants who wish to sit for the exam without attending official training to have a minimum of two years of work experience in the information security domain and to submit an eligibility application with a non-refundable fee of USD $100. Candidates who complete an authorized EC-Council training course have the application fee included and gain direct exam eligibility upon course completion.
While there are no mandatory prerequisite certifications, candidates are strongly advised to arrive with a working understanding of application security concepts, the Software Development Lifecycle (SDLC), and CI/CD pipeline fundamentals. Familiarity with at least one cloud platform (AWS or Azure), containerization concepts (Docker, Kubernetes), and basic scripting will allow candidates to make full use of the lab-heavy curriculum and perform well on exam questions focused on practical tool configuration and pipeline integration.
The E|CDE exam (code 312-97) consists of 100 multiple-choice questions and must be completed within 240 minutes (4 hours). The exam is closed-book and is delivered exclusively through the ECC Exam Centre portal; it is not available at third-party proctoring sites. A passing score of 70% (70 out of 100 correct) is required. The exam fee is USD $550, and the voucher is valid for one year from the date of receipt.
There are no published unscored or survey questions. Upon passing, certified professionals are enrolled in EC-Council's Continuing Education Scheme and must pay an annual maintenance fee of USD $80 to keep the credential active.
Holding the E|CDE credential positions professionals for high-demand roles in the DevSecOps specialty, which sits at the convergence of software engineering, cloud operations, and cybersecurity — a skills combination that remains scarce in the market. Certified professionals typically pursue titles such as DevSecOps Engineer, Cloud DevSecOps Engineer (AWS or Azure-focused), Infrastructure DevSecOps Engineer, or DevSecOps CI/CD Specialist. According to EC-Council's published data, the average annual salary for a DevSecOps engineer in the United States is approximately USD $139,479, with entry-level positions starting around USD $118,733 and experienced practitioners earning upward of USD $172,500.
Compared to broader security credentials such as CompTIA Security+ or even CEH, E|CDE is deliberately narrow and applied, making it a strong differentiator for professionals who want to demonstrate pipeline-specific security engineering skills to employers adopting DevSecOps practices. The certification's hands-on lab focus on both AWS and Azure cloud environments also complements cloud platform certifications and makes the credential appealing to organizations undergoing cloud-native transformation. Annual continuing education requirements ensure the credential stays current as the tooling landscape evolves.
1. A DevSecOps team integrates OWASP Dependency-Check into their Maven build pipeline to scan Java application dependencies for known vulnerabilities. Builds must fail if any dependency has a CVSS score of 7.0 or higher. The team needs to generate HTML reports for security review and use the National Vulnerability Database API key to avoid rate limiting during CI/CD execution. Which Maven configuration correctly implements these requirements? (Select one!)
2. An organization implements Kubernetes Pod Security Standards (PSS) to enforce security policies across multiple namespaces. The production namespace requires the most restrictive security controls: containers must run as non-root, privilege escalation must be prevented, and only specific volume types are allowed. Which Pod Security Standard level should be enforced on the production namespace? (Select one!)
3. A DevSecOps architect designs a comprehensive security testing strategy for a microservices platform following the shift-left principle. The strategy must include IDE integration, pre-commit validation, CI pipeline scanning, and runtime protection. Testing capabilities are allocated as follows: SAST in IDE and CI pipeline, DAST in staging environment, SCA in CI pipeline, secret scanning in pre-commit hooks. Which testing gap exists in this strategy? (Select one!)
4. A DevOps team implements Ansible for configuration management with sensitive variables stored in playbooks. The team must encrypt database passwords, API keys, and TLS private keys. Which Ansible Vault workflow correctly implements encryption and usage? (Select one!)
5. A startup implements shift-left security practices and wants to prevent secrets from entering their Git repository. They configure pre-commit hooks using a YAML configuration file. Which tool combination and configuration correctly implements secret detection before commits reach the repository? (Select one!)
All exams included • Cancel anytime