DES 285 – OWASP IoT5: Mitigating Use of Insecure or Outdated Components
Rated 3.5/5 based on 11 customer reviews

DES 285 – OWASP IoT5: Mitigating Use of Insecure or Outdated Components

Available: In Stock
$795.00

Image

COURSE OVERVIEW

In this course, you will learn how to mitigate the risks associated with the use of deprecated or insecure software components/libraries that could allow the device to be compromised. This includes insecure customization of operating system platforms and the use of third-party software or hardware components from a compromised supply chain.

After completing this course you will be able to:

  • identify and mitigate threats posed by insecure and outdated components

COURSE DETAILS

Course Number: DES 285

Course Duration: 12 minutes

 

COURSE OVERVIEW

In this course, you will learn how to mitigate the risks associated with the use of deprecated or insecure software components/libraries that could allow the device to be compromised. This includes insecure customization of operating system platforms and the use of third-party software or hardware components from a compromised supply chain.

After completing this course you will be able to:

  • identify and mitigate threats posed by insecure and outdated components

COURSE DETAILS

Course Number: DES 285

Course Duration: 12 minutes