Course contentsShow
Security
Lesson 3028 of 3,05256. Security Automation and ToolingPro lesson

Dependency Scanning and SCA

Automating software composition analysis to detect vulnerable dependencies during build and deployment stages.

This lesson is for subscribers

You've completed the free preview. Subscribe to unlock every lesson in every course.