From the course: Building Secure Software Supply Chains with Open-Source Tools
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Setting up the environment: Docker and the OWASP juice shop
From the course: Building Secure Software Supply Chains with Open-Source Tools
Setting up the environment: Docker and the OWASP juice shop
- Before we analyze threats or scan containers, we need a safe environment to experiment with. That is why the setup is for. We're going to install Docker or check if that's already running and deploy OWASP Juice Shop and intentionally vulnerable verification that we'll use throughout the course. First of all, please double-check that you are actually in the KTOP code space environment provided. This will be on the bottom-left part of your screen, the blue space. Alright, let's begin with Docker. In this page, we'll have the comment that you'll have to type, so if you're comfortable with typing, you can go ahead. If not, you can copy and paste you'll be able to get the result of this comment. First of all, let's check the Docker version that we're running. Docker is running and we are running the version 28.3. That's the good news. After that, we're going to check if Docker works properly. So, we will use the…
Contents
-
-
-
(Locked)
What is supply chain security?2m 11s
-
(Locked)
Why supply chain security matters in modern software development2m 48s
-
(Locked)
Vulnerabilities, dependency poisoning, and secrets leakage2m 29s
-
(Locked)
Overview of tools: Syft, Grype, Trivy, Gitleaks2m 56s
-
(Locked)
Setting up the environment: Docker and the OWASP juice shop2m 47s
-
(Locked)
-
-
-
-
-