- Level Foundation
- Duration 40 hours
- Course by The Linux Foundation
- Total students 1,410 enrolled
-
Offered by
About
Building and distributing software that is secure throughout its entire lifecycle can be challenging, leaving many projects unprepared to build securely by default. Attacks and vulnerabilities can emerge at any step of the chain, from writing to packaging and distributing software to end users. Sigstore is one of several innovative technologies that have emerged to improve the integrity of the software supply chain, reducing the friction developers face in implementing security within their daily work.
This course is designed with end users of Sigstore tooling in mind: software developers, DevOps engineers, security engineers, software maintainers, and related roles. To make the best of this course, you will need to be familiar with Linux terminals and using command line tools. You will also need to have intermediate knowledge of cloud computing and DevOps concepts, such as using and building containers and CI/CD systems like GitHub actions.
This course will introduce you to Cosign, Fulcio, and Rekor, the tools under the Sigstore umbrella, explaining how they support a more secure software supply chain. You will learn how to employ these tools throughout your software development, testing, and distribution processes. Additionally, those who use or implement your software will be able to verify its authenticity through tamper-resistant public logs.
Upon completing this course, you will be able to inform your organization's security strategy and build software more securely by default.
What you will learn
-
Describe the components of Sigstore and how they support a more secure software supply chain.
-
Sign and verify software artifacts with Sigstore.
-
Understand how to implement Sigstore within the software development lifecycle.
Skills you learn
Syllabus
- Welcome
- 1. Introducing Sigstore
- 2. Cosign: Signing and Verifying Containers and Artifacts
- 3. Fulcio: The Trusted Digital Certificate Authority
- 4. Rekor: The Immutable and Secure Transparency Log
- 5. Policy Controller: The Kubernetes Cluster Gatekeeper
- 6. Getting Involved with the Sigstore Community
- Final Exam (verified track only)
Auto Summary
"Securing Your Software Supply Chain with Sigstore" is a foundational IT course on edX, focusing on utilizing the Sigstore toolkit to ensure software integrity. Over 40 hours, learners will explore automated signing and verification of various release files, container images, and more. Subscription options include Starter and Professional, making it ideal for IT professionals looking to enhance their software security skills.

Lisa Tagliaferri

John Speed Meyers