Course Description
In this course, you will learn how to mitigate the risks associated with the use of deprecated or insecure software components/libraries that could allow the device to be compromised. This includes insecure customization of operating system platforms, and the use of third-party software or hardware components from a compromised supply chain.
Learning Objectives
On successful completion of this course, learners should have the knowledge and skills to:
- Identify and mitigate threats posed by insecure and outdated components