YoVDO

Exploiting Vulnerabilities and Flaws to Attack Supply Chain

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Supply Chain Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into a 36-minute conference talk from RSA Conference that explores the vulnerabilities in the supply chain ecosystem. Learn how security researchers Ilay Goldman and Yakir Kadkoda from Aqua Security uncover various attack vectors targeting platforms trusted by developers. Examine potential exploits in integrated development environments (IDEs), source code management (SCM) systems, package managers, and CI/CD pipelines. Gain insights into the security risks present in these critical components of the software development lifecycle and understand the importance of safeguarding the entire supply chain against potential threats.

Syllabus

Exploiting Vulnerabilities and Flaws to Attack Supply Chain


Taught by

RSA Conference

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Supply Chain and Operations Management Tips
LinkedIn Learning
Kubernetes Security: Implementing Supply Chain Security
Pluralsight
Implement Cybersecurity Best Practices in Your Organization
Salesforce via Trailhead
ISC2 Certified Secure Software Life-Cycle Professional (CSSLP)
Cybrary