YoVDO

Securing Gradle Builds: Protecting Against Supply Chain Attacks

Offered By: Android Makers via YouTube

Tags

Gradle Courses Android Development Courses Supply Chain Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical security concerns surrounding Gradle and learn effective strategies to safeguard your builds from potential threats in this 37-minute conference talk from Android Makers. Gain valuable insights into the Gradle Wrapper supply-chain attack and understand how to implement protective measures. Discover the intricacies of Gradle dependency attacks and acquire practical defense techniques. Obtain a comprehensive list of security best practices for Gradle, including wrapper verification, repository filtering, and dependency verification. Delve into topics such as introduction, dependency verification, metadata verification, ASC file verification, pros and cons, Minecraft verification, and pull via methods. Leave equipped with essential knowledge to enhance the security of your Gradle projects and protect against common vulnerabilities.

Syllabus

Intro
Introduction
Dependency Verification
Metadata Verification
ASC File Verification
Pros and Cons
Minecraft
Verification
Pull via
Conclusion


Taught by

Android Makers

Related Courses

Creative, Serious and Playful Science of Android Apps
University of Illinois at Urbana-Champaign via Coursera
Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera
Android. Programación de Aplicaciones
Miríadax
Programming Mobile Applications for Android Handheld Systems: Part 1
University of Maryland, College Park via Coursera
Begin Programming: Build Your First Mobile Game
University of Reading via FutureLearn