Stranger Danger - Your JavaScript Attack Surface Just Got Bigger
Offered By: Snyk via YouTube
Course Description
Overview
Dive into a hands-on JavaScript and cloud native live-hacking session in this 52-minute SnykLIVE recording. Explore common threats, vulnerabilities, and misconfigurations in modern JavaScript application development, which now encompasses open-source dependencies, containerization, and cloud infrastructure. Learn about supply chain attacks, cybersecurity challenges in open-source software, and potential issues with containers. Witness live hacking demonstrations and gain insights into protecting your applications through actionable remediation strategies and best practices. Discover the concept of Defense in Depth and receive valuable recommendations for securing your development pipeline. Access useful resources and links to further enhance your understanding of JavaScript security in the cloud native era.
Syllabus
- Stream Start
- Introductions
- The State of OSS
- Examples of open source software attacks
- Supply chain attacks affect all ecosystems
- The iceberg
- Cybersecurity challenges in OSS
- Live Hacking
- What did we learn?
- Back to our iceberg
- What can go wrong with using Containers?
- What's the last layer of the iceberg
- The modern application
- SDLC Pipeline
- Defense in Depth
- Recommendations
- Useful resources
- Closing
Taught by
Snyk
Related Courses
Cloud Foundry Certified DeveloperA Cloud Guru Google Cloud Certified Professional Cloud Developer
A Cloud Guru Building Modern .NET Applications on AWS
Amazon Web Services via edX Approfondimento su AWS Fargate: costruire container serverless su larga scala (Italiano) | Deep Dive on AWS Fargate: Building Serverless Containers at Scale (Italian)
Amazon Web Services via AWS Skill Builder Approfondimento su AWS Fargate: costruire container serverless su larga scala (Italiano) | Deep Dive on AWS Fargate: Building Serverless Containers at Scale (Italian)
Amazon Web Services via AWS Skill Builder