YoVDO

Securing Gradle Builds: Protecting Against Supply Chain Attacks

Offered By: Android Makers via YouTube

Tags

Gradle Courses Android Development Courses Supply Chain Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical security concerns surrounding Gradle and learn effective strategies to safeguard your builds from potential threats in this 37-minute conference talk from Android Makers. Gain valuable insights into the Gradle Wrapper supply-chain attack and understand how to implement protective measures. Discover the intricacies of Gradle dependency attacks and acquire practical defense techniques. Obtain a comprehensive list of security best practices for Gradle, including wrapper verification, repository filtering, and dependency verification. Delve into topics such as introduction, dependency verification, metadata verification, ASC file verification, pros and cons, Minecraft verification, and pull via methods. Leave equipped with essential knowledge to enhance the security of your Gradle projects and protect against common vulnerabilities.

Syllabus

Intro
Introduction
Dependency Verification
Metadata Verification
ASC File Verification
Pros and Cons
Minecraft
Verification
Pull via
Conclusion


Taught by

Android Makers

Related Courses

Developing Android Apps
Google via Udacity
Gradle for Android and Java
Google via Udacity
Become an Android Developer
Google via Udacity
Android-разработка: основы, многопоточность, архитектура
Moscow Institute of Physics and Technology via Coursera
Restful Web Service Spring Boot Visual Studio Code Gradle
Coursera Project Network via Coursera