Secure Software Supply Chain for CSSLP®
Offered By: Pluralsight
Course Description
Overview
This course covers 11% of the CSSLP® examination. You will learn how to securely manage third party software to support business goals and regulatory requirements.
Many organizations are dependent on third party software to support business operations and it is essential to ensure that this software is secure and meets legal requirements. In this course, Secure Software Supply Chain for CSSLP®, you will learn foundational knowledge about managing the security of this third party software. First, you will discover the process of selecting a vendor. Next, you will learn to manage the risk of software acquisition and deployment. Finally, you will explore how to assess the security of software during operations. When you are finished with this course, you will have the skills and knowledge of secure software supply chain needed to manage security risk and prepare for the CSSLP® examination.
Many organizations are dependent on third party software to support business operations and it is essential to ensure that this software is secure and meets legal requirements. In this course, Secure Software Supply Chain for CSSLP®, you will learn foundational knowledge about managing the security of this third party software. First, you will discover the process of selecting a vendor. Next, you will learn to manage the risk of software acquisition and deployment. Finally, you will explore how to assess the security of software during operations. When you are finished with this course, you will have the skills and knowledge of secure software supply chain needed to manage security risk and prepare for the CSSLP® examination.
Taught by
Kevin Henry
Related Courses
CSSLP Cert Prep: 8 Supply Chain and Software AcquisitionLinkedIn Learning Docker Container Security
Docker via YouTube Using Docker to Scale Operational Intelligence at Splunk
Docker via YouTube Docker + vSphere - Two Great Tools That Work Great Together
Docker via YouTube How to Use Mirantis Container Runtime to Secure Business-Critical Applications
Mirantis via YouTube