DES 285 – OWASP IoT5: Mitigating Use of Insecure or Outdated Components
![Image](http://ditechsolutions.com/cdn/shop/t/2/assets/in_cart.png?v=160675125674534043661568827446)
COURSE OVERVIEW
In this course, you will learn how to mitigate the risks associated with the use of deprecated or insecure software components/libraries that could allow the device to be compromised. This includes insecure customization of operating system platforms and the use of third-party software or hardware components from a compromised supply chain.
After completing this course you will be able to:
- identify and mitigate threats posed by insecure and outdated components
COURSE DETAILS
Course Number: DES 285
Course Duration: 12 minutes
COURSE OVERVIEW
In this course, you will learn how to mitigate the risks associated with the use of deprecated or insecure software components/libraries that could allow the device to be compromised. This includes insecure customization of operating system platforms and the use of third-party software or hardware components from a compromised supply chain.
After completing this course you will be able to:
- identify and mitigate threats posed by insecure and outdated components
COURSE DETAILS
Course Number: DES 285
Course Duration: 12 minutes