YoVDO

Supply Chain Security: From Infrastructure to Application, Code to Cloud

Offered By: Linux Foundation via YouTube

Tags

Supply Chain Security Courses DevSecOps Courses Information Security (InfoSec) Courses Application Security Courses Cloud Security Courses Container Security Courses Runtime Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Join a 50-minute Linux Foundation live webinar exploring comprehensive supply chain security strategies. Delve into InfoSec principles, "everything as code" approaches, and the importance of supply chain context. Learn about declarative and deterministic security practices, securing various layers from infrastructure to application code, and protecting dependencies. Explore techniques for safeguarding open-source supply chains, container images, and deployments. Discover best practices for maintaining runtime security and gain valuable insights to enhance your organization's overall security posture.

Syllabus

Intro
Security (A.K.A. InfoSec)
Everything as code
Invert our thinking
The Importance of Supply Chain Context - Part 1
Declarative = Deterministic
The (Supply Chain) Layers
Secure the base (or cloud)
Securing the code (The actual application source code)
Securing your dependencies FRIENDS
Securing the (OSS) supply chain
Securing the image • Pros Teaches best practices
Layer 5: Securing the deployment . Abstractions Difficult to scan the code
The Runtime - Maintain the state of security!
Key takeaways


Taught by

Linux Foundation

Tags

Related Courses

Maintaining Deployment Security in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning
Securing Containers and Kubernetes Ecosystem
LinkedIn Learning
Performing DevSecOps Automated Security Testing
Pluralsight