Completed
John Sawyer
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Pen-Testing the Supply Chain
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 John Sawyer
- 3 Overview
- 4 Paradigm Shift
- 5 Supply Chain Vulnerability
- 6 How far does the supply chain go
- 7 Supply chain risks
- 8 Supply chain security
- 9 Minecast compromise
- 10 Minor Enterprise Attack Framework
- 11 Supply Chain Compromise
- 12 Supplier Attacks
- 13 Software Vulnerabilities
- 14 Example of a Compromise
- 15 What Can You Do
- 16 Vendor Risk Assessments
- 17 Policies
- 18 Intelligence gathering
- 19 Different areas of testing
- 20 Security
- 21 Penetration Testing
- 22 Source Code Security