YoVDO

Mitigating Attacks on Software Supply Chain Using GOSH Docker Extension

Offered By: Docker via YouTube

Tags

Software Supply Chain Security Courses Formal Verification Courses Smart Contracts Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how to mitigate attacks on the software supply chain using the GOSH Docker Extension in this 37-minute video presentation. Delve into the key features of GOSH, including container verification through a Decentralized Name Service, trustless cryptographic signatures, decentralized autonomous organization (DAO) governance, and automated CI/CD pipeline security. Learn how these components work together to prevent common attack vectors, ensure code integrity, and enhance overall security in software development. Gain insights from GOSH co-founder Mitja Goroshevsky on implementing formal verification and smart contracts to create a robust, immutable software supply chain. Discover practical strategies to protect your repositories, verify contributor identities, and automate security checks using blockchain technology and the GOSH Docker Extension.

Syllabus

Mitigating attack on Software Supply Chain using GOSH Docker Extension


Taught by

Docker

Related Courses

GitHub Supply Chain Security Using GitGat
Linux Foundation via edX
Introduction to Security Principles in Cloud Computing
Google via Google Cloud Skills Boost
DevOps with GitHub and Azure: Implementing Software Supply Chain Security with GitHub
Pluralsight
Hardening Your Soft Software Supply Chain
Pluralsight
Secure Software Supply Chain: Using Cloud Build & Cloud Deploy to Deploy Containerized Applications
Google via Google Cloud Skills Boost