The book series begins (in Fascicle 0) by taking the reader to the 30,000’ view, so you can start to see the entire security landscape. Kim then attempts to explain a very simple threat modelling approach that Bruce Schneier created, called the Sensible Security Model (SSM). Kim takes the learnings from the first chapter and applies them to lower levels. Kim details how to set-up a security focussed distribution with all the tools and configuration options required for working through the book series. He then walks through the Process and Practises that the attackers often execute, and we take the learnings from that and train the defenders on how they can bring the finding of defects from the most expensive place to the cheapest place, within your Sprint cycles.
The rest of the book series (Fascicle 1 and 2) focusses on the specific areas addressed on the covers of each book. Allowing your purple team to create security focussed product backlog items and insert them into your usual Product Backlog.
Kim also runs workshops based on the content of this book for development teams wishing to improve their security stature.