Completed
Evidence Based Identification Issues
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
OWASP Flagship Projects - OWASP Dependency-Check
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Software Composition Analysis
- 3 Primary Data Sources
- 4 Vulnerability Data Source • National Vulnerability Database (NVD) List of Common Vulnerability and Exposures (CVE) • Each CVE entry contains • A description of the vulnerability
- 5 Library Identification Problems • Development & Security use different identifiers
- 6 Evidence Based Identification Issues
- 7 Dealing with False Positives Invalid dependency identification can be resolved using a suppression file
- 8 Onboarding an Application
- 9 Use Cases for dependency-check
- 10 How can you help?