Exploiting Vulnerabilities and Flaws to Attack Supply Chain
Offered By: RSA Conference via YouTube
Course Description
Overview
Dive into a 36-minute conference talk from RSA Conference that explores the vulnerabilities in the supply chain ecosystem. Learn how security researchers Ilay Goldman and Yakir Kadkoda from Aqua Security uncover various attack vectors targeting platforms trusted by developers. Examine potential exploits in integrated development environments (IDEs), source code management (SCM) systems, package managers, and CI/CD pipelines. Gain insights into the security risks present in these critical components of the software development lifecycle and understand the importance of safeguarding the entire supply chain against potential threats.
Syllabus
Exploiting Vulnerabilities and Flaws to Attack Supply Chain
Taught by
RSA Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network