YoVDO

Increase Security Posture in Software Delivery with Red Hat Trusted Software Supply Chain

Offered By: Red Hat Developer via YouTube

Tags

Software Security Courses DevSecOps Courses CI/CD Pipelines Courses Vulnerability Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover how to enhance your software delivery security posture with Red Hat Trusted Software Supply Chain in this 31-minute video presentation. Learn to safeguard components, processes, and practices in your software factory against Day Zero vulnerabilities. Follow a comprehensive walkthrough demonstrating how Red Hat Trusted Software Supply Chain proactively prevents and predicts security issues, ultimately improving business resiliency. Explore key topics including the Red Hat Developer Hub, software templates, dependency analytics, pipeline status, promotion pipeline, build pipeline, and monitoring. Gain valuable insights from Markus Nagel, Principal Product Marketing Manager, as he guides you through the essential steps to fortify your software supply chain and mitigate potential security risks.

Syllabus

Introduction
Red Hat Developer Hub
Software Templates
Dependency Analytics
Pipeline Status
Promotion Pipeline
Build Pipeline
Monitoring
Conclusion


Taught by

Red Hat Developer

Related Courses

Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera
Engineering Maintainable Android Apps
Vanderbilt University via Coursera
Software Design as an Element of the Software Development Lifecycle
University of Colorado System via Coursera
Secure Software Development
Pluralsight
Secure Software Concepts for CSSLPĀ®
Pluralsight