Completed
ThirdParty Software
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Protecting Yourself From Supply Chain Attacks - Trust Is Overrated
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Caffeine
- 3 Questioning the Supply Chain
- 4 Measuring Caffeine in Coffee
- 5 How to Minimize Supply Chain Risks
- 6 Linux
- 7 Digital Supply Chain
- 8 Trust
- 9 Real World Attacks
- 10 Trusted Platform Module
- 11 Defending the Supply Chain
- 12 LVFS FWUPD
- 13 Inksy
- 14 MSI Breach
- 15 Black Lotus
- 16 FWUPD
- 17 Secure Boot
- 18 ThirdParty Software
- 19 Linux Example
- 20 Software Developed Inhouse
- 21 Vulnerability Management
- 22 Google Java in Python
- 23 Conclusion
- 24 Questions