Mitigating Attacks on Software Supply Chain Using GOSH Docker Extension
Offered By: Docker via YouTube
Course Description
Overview
Explore how to mitigate attacks on the software supply chain using the GOSH Docker Extension in this 37-minute video presentation. Delve into the key features of GOSH, including container verification through a Decentralized Name Service, trustless cryptographic signatures, decentralized autonomous organization (DAO) governance, and automated CI/CD pipeline security. Learn how these components work together to prevent common attack vectors, ensure code integrity, and enhance overall security in software development. Gain insights from GOSH co-founder Mitja Goroshevsky on implementing formal verification and smart contracts to create a robust, immutable software supply chain. Discover practical strategies to protect your repositories, verify contributor identities, and automate security checks using blockchain technology and the GOSH Docker Extension.
Syllabus
Mitigating attack on Software Supply Chain using GOSH Docker Extension
Taught by
Docker
Related Courses
SPARK 2014AdaCore via Independent Automated Reasoning: Symbolic Model Checking
EIT Digital via Coursera Software Testing and Verification
University System of Maryland via edX Haskell for Imperative Programmers
YouTube Model Checking and Temporal Logic - E. Allen Emerson's Turing Award Lecture
Association for Computing Machinery (ACM) via YouTube