YoVDO

Supply Chain Security: From Infrastructure to Application, Code to Cloud

Offered By: Linux Foundation via YouTube

Tags

Supply Chain Security Courses DevSecOps Courses Information Security (InfoSec) Courses Application Security Courses Cloud Security Courses Container Security Courses Runtime Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Join a 50-minute Linux Foundation live webinar exploring comprehensive supply chain security strategies. Delve into InfoSec principles, "everything as code" approaches, and the importance of supply chain context. Learn about declarative and deterministic security practices, securing various layers from infrastructure to application code, and protecting dependencies. Explore techniques for safeguarding open-source supply chains, container images, and deployments. Discover best practices for maintaining runtime security and gain valuable insights to enhance your organization's overall security posture.

Syllabus

Intro
Security (A.K.A. InfoSec)
Everything as code
Invert our thinking
The Importance of Supply Chain Context - Part 1
Declarative = Deterministic
The (Supply Chain) Layers
Secure the base (or cloud)
Securing the code (The actual application source code)
Securing your dependencies FRIENDS
Securing the (OSS) supply chain
Securing the image • Pros Teaches best practices
Layer 5: Securing the deployment . Abstractions Difficult to scan the code
The Runtime - Maintain the state of security!
Key takeaways


Taught by

Linux Foundation

Tags

Related Courses

Information Security and Risk Management in Context
University of Washington via Coursera
Designing and Executing Information Security Strategies
University of Washington via Coursera
Intro to Information Security
Georgia Institute of Technology via Udacity
Information Security and Risk Management: An Overview
University of Washington via Canvas Network
Information Security- II
Indian Institute of Technology Madras via Swayam