Struts2 Vulnerability Workshop - Securing Applications Against Supply Chain Attacks

Struts2 Vulnerability Workshop - Securing Applications Against Supply Chain Attacks

Linux Foundation via YouTube Direct link

Instructions

15 of 22

15 of 22

Instructions

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Struts2 Vulnerability Workshop - Securing Applications Against Supply Chain Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Why are we building software
  3. 3 Large change in the way we develop
  4. 4 Agile to DevOps
  5. 5 Open Source
  6. 6 Disadvantages of Open Source
  7. 7 Software Supply Chain Attacks
  8. 8 Confluence Server Attack
  9. 9 PipeI Package Attack
  10. 10 Biden Executive Order
  11. 11 Evil Hackers
  12. 12 Workshop Walkthrough
  13. 13 Requirements
  14. 14 Setup
  15. 15 Instructions
  16. 16 OS Index
  17. 17 OS Index Overview
  18. 18 Supported Languages
  19. 19 AHAB
  20. 20 How popular is that package
  21. 21 Integrations
  22. 22 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.