در حال حاضر محصولی در سبد خرید شما وجود ندارد.

پنل کاربری

رمز خود را فراموش کرده اید؟ اگر اولین بار است از سایت جدید استفاده میکنید باید پسورد خود را ریست نمایید.
دسته بندی
دسته بندی

Software Composition Analysis

24,900 تومان
بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
خرید دانلودی فوری

در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

ویدئو معرفی این محصول

Component libraries are critical for secure software development. They’re included in the frameworks used to run your end systems and web applications, but sometimes the components contain flaws. In this course, instructor Malcolm Shore gives an overview of the basic concepts of software composition analysis, showing you common tools to perform an effective analysis.

Discover the importance of knowing how to extract a software bill of materials, especially when you want to pinpoint vulnerabilities to protect your software from potential attacks. Get tips on identifying components that might lead to a security breach, as you explore which software composition analysis tools to use for each attack. Malcolm gives you pointers on using the CycloneDX SBOM exchange, SCANOSS, the ShiftLeft SCA tool, and the OWASP dependency checker. By the end of this course, you’ll be equipped with the skills to understand software component analysis and keep your software running safely and securely.


01 - Introduction
  • 01 - Protecting against embedded component threats
  • 02 - What you should know
  • 03 - Disclaimer

  • 02 - 1. Software Components
  • 01 - Understanding software components
  • 02 - Understanding software bill of materials (SBOM)
  • 03 - Software component licensing
  • 04 - Software component security
  • 05 - Running a component exploit
  • 06 - Building your own vulnerable component

  • 03 - 2. Software Composition Analysis Tools
  • 01 - What is software composition analysis
  • 02 - OWASP and the CycloneDX SBOM exchange
  • 03 - Analyzing software with SCANOSS
  • 04 - Thinking about component vulnerabilities
  • 05 - Checking for software component vulnerabilities
  • 06 - Scanning with an automated SCA tool
  • 07 - Using the OWASP dependency checker
  • 08 - Identifying the origin of software components

  • 04 - Conclusion
  • 01 - What's next