Supply Chain Security: From Infrastructure to Application, Code to Cloud

Supply Chain Security: From Infrastructure to Application, Code to Cloud

Linux Foundation via YouTube Direct link

Intro

1 of 15

1 of 15

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Supply Chain Security: From Infrastructure to Application, Code to Cloud

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Security (A.K.A. InfoSec)
  3. 3 Everything as code
  4. 4 Invert our thinking
  5. 5 The Importance of Supply Chain Context - Part 1
  6. 6 Declarative = Deterministic
  7. 7 The (Supply Chain) Layers
  8. 8 Secure the base (or cloud)
  9. 9 Securing the code (The actual application source code)
  10. 10 Securing your dependencies FRIENDS
  11. 11 Securing the (OSS) supply chain
  12. 12 Securing the image • Pros Teaches best practices
  13. 13 Layer 5: Securing the deployment . Abstractions Difficult to scan the code
  14. 14 The Runtime - Maintain the state of security!
  15. 15 Key takeaways

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.