Securing Your Software Supply Chain with Sigstore

About this Course

Building and distributing software that is secure throughout its entire lifecycle can be challenging, leaving many projects unprepared to build securely by default. Attacks and vulnerabilities can emerge at any step of the chain, from writing to packaging and distributing software to end users. Sigstore is one of several innovative technologies that have emerged to improve the integrity of the software supply chain, reducing the friction developers face in implementing security within their daily work. This course is designed with end users of Sigstore tooling in mind: software developers, DevOps engineers, security engineers, software maintainers, and related roles. To make the best of this course, you will need to be familiar with Linux terminals and using command line tools. You will also need to have intermediate knowledge of cloud computing and DevOps concepts, such as using and building containers and CI/CD systems like GitHub actions. This course will introduce you to Cosign, Fulcio, and Rekor, the tools under the Sigstore umbrella, explaining how they support a more secure software supply chain. You will learn how to employ these tools throughout your software development, testing, and distribution processes. Additionally, those who use or implement your software will be able to verify its authenticity through tamper-resistant public logs. Upon completing this course, you will be able to inform your organization’s security strategy and build software more securely by default.

Created by: The Linux Foundation

Level: Introductory


Related Online Courses

Meeting growing global energy demand, while mitigating climate change and environmental impacts, requires a large-scale transition to clean, sustainable energy systems. Students and professionals... more
Speech recognition, drones, and self-driving cars – things that once seemed like pure science fiction – are now widely available technologies, and just a few examples of how humans have taught mac... more
In this course, we build upon basic knowledge of software-based timing and cache attacks as well as the side-channel mindset. Same as in the prior courses, we do not just enumerate side-channel... more
Este curso online da un repaso por los distintos menús de la herramienta Word, revisando a fondo sus distintas opciones e incidiendo en las funcionalidades de la herramienta que no son intuitivas, ... more
Developers working in cloud native teams face the challenge of shuffling between microservices, external APIs, libraries, and other software components. Developer portals like Backstage can help... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL