Be your software supply chains gatekeeper from code to runtime
Issued by
JFrog
End-to-end supply chain security requires vigilance. This starts before the developer calls an external package, through proprietary code development, code compiling, interim builds, and the pipeline to release and distribution, all the way to production and after deployment. In this training, we’ll identify a typical Enterprise Software Supply chain and its risk for attack. We’ll also discuss ways to enable end-to-end vigilance for software supply chain risk management.
Skills
Earning Criteria
-
End-to-end supply chain security requires vigilance. This starts before the developer calls an external package, through proprietary code development, code compiling, interim builds, and the pipeline to release and distribution, all the way to production and after deployment. In this training, we’ll identify a typical Enterprise Software Supply chain and its risk for attack. We’ll also discuss ways to enable end-to-end vigilance for software supply chain risk management.