Completed
Supply Chain Attacks
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Reverse Engineering and Exploiting Builds in the Cloud
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Shoutouts
- 3 Heroku Engineering
- 4 What is CICD
- 5 CICD Components
- 6 Common Deployment Patterns
- 7 Fully Multitenant
- 8 Single Tenant
- 9 Networking
- 10 Virtual Network
- 11 Add Directive
- 12 Demo
- 13 Whats the impact
- 14 Remediation
- 15 Assumptions
- 16 Power of Command
- 17 Commands in Containers
- 18 Orchestrators Fail
- 19 Component Verification
- 20 Supply Chain Attacks
- 21 Potential Attack Scenario
- 22 Build Environments
- 23 How do we do this
- 24 Demo OCR Image
- 25 Demo OCR Image Containers
- 26 Evil Forks
- 27 Cheat Sheets
- 28 Conclusion
- 29 Supply chain security
- 30 Wrapup
- 31 Multitenancy
- 32 Research
- 33 Thank you