Skip to content

Free AppSec Lessons

Software Supply Chain Security

Free Software Supply Chain Security Lessons

The software supply chain is increasingly becoming a target for cyberattacks. The security of your supply chain is as important as the code itself.

Our supply chain path covers everything from securing third-party dependencies to protecting your build pipeline and preventing code tampering.

Sign up today for free access to two supply chain security lessons and experience the difference our training can make. Start building secure software, from the ground up.

  • Access to Two Software Supply Chain Security Lessons - Sample lessons from our supply chain learning path, 1 video and 1 hands-on lesson.

 

Fill Out this Form for Your Supply Chain Learning Path

What Makes Security Journey's Software Supply Chain Security Training Different?

Security Journey's comprehensive learning path provides developers with the knowledge and skills to strengthen software supply chains. Learners gain a deep understanding of essential tools, frameworks, and best practices through 10 expert-led video lessons.

Click through the lessons here to learn more about the Software Supply Chain Security Learning Path.

Introduction to Software Supply Chain Security

Explore the essential concepts and practices for securing the entire software supply chain, from sourcing and integrating components to managing third-party risks and ensuring continuous security throughout the software lifecycle. 

Secure Supply Chain Consumption Framework (S2C2F) | Part 1

Learn how to securely ingest and manage open source software within your projects by leveraging the Secure Supply Chain Consumption Framework (S2C2F), focusing on governance, continuous improvement, and scalable practices to ensure the integrity and security of your software supply chain. 

Secure Supply Chain Consumption Framework (S2C2F) | Part 2

Dive deeper into the Secure Supply Chain Consumption Framework (S2C2F), focusing on key practices such as updating, auditing, enforcing, and rebuilding open source software artifacts to ensure a secure and resilient software supply chain. 

S2C2F: Implementation Guide | Part 1

Learn how to implement the Secure Supply Chain Consumption Framework by understanding and applying its maturity levels, progressively enhancing your organization's security practices from basic to advanced, while focusing on key practices such as ingestion, scanning, inventorying, and proactive security measures. 

S2C2F: Implementation Guide | Part 2

Continue to explore the Secure Supply Chain Consumption Framework, focusing on advanced practices such as keeping components up to date, auditing processes, enforcing security measures, rebuilding software in a trusted environment, and addressing critical vulnerabilities, all while progressing through the maturity levels to enhance your organization's security posture. 

Software Component Verification Standard (SCVS) | Part 1

Delve into the Software Component Verification Standard (SCVS), learning how to apply its three maturity levels to secure the software supply chain by implementing practices that include inventory management, creating and maintaining software bills of materials (SBOMs), and ensuring the integrity and provenance of your software components. 

Software Component Verification Standard (SCVS) | Part 2

Continue exploring the Software Component Verification Standard (SCVS) by focusing on Control Families related to hardening the build environment and securing package management, implementing practices across various maturity levels to ensure consistent, secure, and auditable software production and distribution processes. 

Software Component Verification Standard (SCVS) | Part 3

Continue exploring the Software Component Verification Standard (SCVS) by delving into the Control Families for component analysis and pedigree/provenance, learning how to implement automated processes, maintain a chain of custody, and ensure rigorous security practices for both original and modified software components across various maturity levels.

Software Bill of Materials (SBOM) | Part 1

Explore the concept and benefits of a Software Bill of Materials (SBOM), learning how it serves as a comprehensive inventory of software components and their interactions. You'll also address common myths surrounding SBOMs, such as concerns about security, source code exposure, intellectual property, and license violations, while understanding how SBOMs enhance security, compliance, and efficiency within your software supply chain. 

Software Bill of Materials (SBOM) | Part 2

Dive deeper into the lifecycle of a Software Bill of Materials (SBOM), from production to consumption, understanding how to automate its creation, ensure its ongoing updates, and effectively use it for incident response and other cybersecurity practices. You'll also explore the different SBOM formats like SPDX, SWID, and Cyclone DX, learning how they evolved and their interoperability, while recognizing the broader role of SBOMs in securing the software supply chain amidst the rapidly evolving landscape of tools and regulations. 

Where will your Security Journey take you?

Security Journey Platform Training

Secure Coding Training is Critical For Safe Applications

Security Journey empowers businesses to fortify their defenses and cultivate a security-first culture. Our comprehensive, multi-year program equips your team with the knowledge and skills needed to build more secure applications:

  • In-Depth Application Security Education - A robust curriculum covering foundational concepts to advanced techniques.
  • Hands-On Secure Coding Training - Engaging exercises and simulations to practice real-world scenarios.
  • Diverse Content Formats - Video-based discussions, interactive challenges, and more to suit different learning styles.

Empower your developers with the tools, training, and motivation they need to create secure code that protects your business.

Learn More About Software Supply Chain

SJ2024_SupplyChainIntro

Secure Your Software's Foundation: Supply Chain Security Training from Security Journey

No longer confined to the physical movement of goods, supply chain threats now permeate the digital realm, targeting the very code that powers our digital world.

SJ2024_SupplyChainDeepDive

Mastering Software Supply Chain Security: A Deep Dive into Modern Approaches and Resources

The software you rely on is not just a product but a complex web of interconnected components, tools, and services. This intricate ecosystem, the software supply chain, is a challenge and a critical imperative for organizations of all sizes.