An attack on your application supply chain is like cutting off the artery connecting organizations to their customers.
Companies have lost billions to supply chain attacks in recent years.
Which is exactly why we're going to show you how to do it. Securing application supply chains is all about understanding how the attacker thinks, and leveraging offensive techniques to build robust defensive measures.
Supply chain security risks are a significant contributor to application attacks, with recent years seeing a rise in supply chain exploits that have cost organizations billions of dollars in financial and reputational damage. While supply chain security and implementation are essential, it's equally important for defenders to understand how supply chain attacks work to strengthen their defense and blue-team implementations.
This training provides a deep, hands-on exploration of defending application supply chains. Starting with an understanding of application supply chains, students will dive into story-driven scenarios, exploring how to defend against supply chain attacks on CI systems, build systems, container infrastructure, and cloud-native infrastructure hosted on Kubernetes, AWS, and Azure.
The supply-chain stories that we’ll be exploring will be explored through an inside-outside view of application supply chains from the infrastructure environment, right through to the server-side and client-side supply chains related to the application.
Harness the power of threat modeling to speed up development & make your pipelines hyper-efficient.
Combine the speed of Agile development with the predictive power of threat modeling.
Use every major threat modeling methodology for a holistic approach to designing software.
Understand your organization’s deepest business logic flaws and minimize the impact of threats.
Methodologies like STRIDE, PASTA, NIST, TRIKE & more
DevSecOps in an Agile environment
Understand threat actors, access & threat outcomes
Combine threat models with rapid DevOps
Crafted on Real-world training for product security teams
Hands-on Experience: Engage with real-world scenarios in a controlled, cloud-based lab environment to apply learning directly.
Immediate Application: Implement Threat Modeling tools and techniques instantly, enhancing retention and understanding.
Access to Specialized Tooling: Utilize advanced Threat Modeling software and LLMs without needing to set up or maintain the infrastructure.
Safe Learning Space: Experiment and learn from mistakes in a risk-free sandbox, encouraging exploration and innovation.
Basic understanding of application security principles.
Familiarity with software development and the software development lifecycle (SDLC).
Some experience in security practices and methodologies is beneficial
For a optimal learning experience in this course, participants should use a laptop with Windows 10/11, the latest macOS, or a modern Linux distribution, equipped with an Intel i5 processor or equivalent (i7 recommended), at least 8GB of RAM (16GB preferred), and 20GB of free disk space. A stable, high-speed internet connection is essential for accessing streaming content and cloud-based labs, alongside the latest versions of Google Chrome, Mozilla Firefox, or Safari with JavaScript enabled. Participants must have administrative rights to install necessary software and a modern code editor like Visual Studio Code.
10