Managing the Modern Software Dependency Ecosystem
Offered By: Pluralsight
Course Description
Overview
This course examines the risks in the modern software dependency ecosystem that we touch every day. In addition, you will see what organizations can do to protect themselves in this landscape.
In the modern era of software development, there are ever-changing risks. In this course, Managing the Modern Software Dependency Ecosystem, you will examine the risks in the modern software dependency ecosystem that we touch every day. First, you will start by looking at how software is increasingly made up of external components and services. This can be great, but it can also introduce new risks. Next, you will identify where those risks typically lie. Finally, you will explore how to mitigate those risks. By the end of the course, you will be able to identify risks in the modern software dependency ecosystem as well as what organizations can do to recognize them and minimize their likelihood of causing damage.
In the modern era of software development, there are ever-changing risks. In this course, Managing the Modern Software Dependency Ecosystem, you will examine the risks in the modern software dependency ecosystem that we touch every day. First, you will start by looking at how software is increasingly made up of external components and services. This can be great, but it can also introduce new risks. Next, you will identify where those risks typically lie. Finally, you will explore how to mitigate those risks. By the end of the course, you will be able to identify risks in the modern software dependency ecosystem as well as what organizations can do to recognize them and minimize their likelihood of causing damage.
Syllabus
- The Modern Software Matrix 7mins
- Threats in the Ecosystem 6mins
- Identifying Dependencies and Risks 7mins
- Mitigating Threats 6mins
- Summary 1min
Taught by
Troy Hunt
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network