Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Rising Threat - Securing Your Open-Source Pipeline
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Primary approaches
- 3 Dependencies
- 4 Complexity
- 5 Conda
- 6 Vulnerabilities
- 7 Cybersecurity Executive Order
- 8 Steps to Secure Your OpenSource Pipeline
- 9 OpenSource Maturity Curve
- 10 Best Practices
- 11 Pitfalls
- 12 Dependency Tree
- 13 Public Repo
- 14 What Happened
- 15 Curated Repo
- 16 Critical Questions
- 17 Anaconda
- 18 Public Data
- 19 Policies
- 20 Integration
- 21 Automate
- 22 Indus
- 23 Security Consultations