University of Maryland Classifieds>University of Maryland Online Courses>Securing Your Software Supply Chain with Sigstore

Securing Your Software Supply Chain with Sigstore

About this Course

Building and distributing software that is secure throughout its entire lifecycle can be challenging, leaving many projects unprepared to build securely by default. Attacks and vulnerabilities can emerge at any step of the chain, from writing to packaging and distributing software to end users. Sigstore is one of several innovative technologies that have emerged to improve the integrity of the software supply chain, reducing the friction developers face in implementing security within their daily work. This course is designed with end users of Sigstore tooling in mind: software developers, DevOps engineers, security engineers, software maintainers, and related roles. To make the best of this course, you will need to be familiar with Linux terminals and using command line tools. You will also need to have intermediate knowledge of cloud computing and DevOps concepts, such as using and building containers and CI/CD systems like GitHub actions. This course will introduce you to Cosign, Fulcio, and Rekor, the tools under the Sigstore umbrella, explaining how they support a more secure software supply chain. You will learn how to employ these tools throughout your software development, testing, and distribution processes. Additionally, those who use or implement your software will be able to verify its authenticity through tamper-resistant public logs. Upon completing this course, you will be able to inform your organization’s security strategy and build software more securely by default.

Created by: The Linux Foundation

Level: Introductory


Related Online Courses

Could we create an opponent that will always beat us in rock paper scissors? How could we educate youth about the climate crisis through a video game? Can a story be interactive? These are some of... more
This course is a practical introduction to Istio, designed for anyone who wishes to build on their knowledge of Linux, Docker, and Kubernetes to learn how to install and configure a service mesh... more
Blockchain is a constantly evolving technology. Essentially, it is a decentralized, distributed, digital ledger consisting of records called blocks that are used to record transactions across many... more
Most data science projects fail. There are various reasons why, but one of the primary reasons is the challenge of deployment. One piece to the deployment puzzle is understanding how to automate... more
Many engineers are puzzled by questions such as: how to shift or reduce peak heating demand to obtain a better match with a smart grid or renewable energy system? What is thermally more efficient:... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL