Room progress ( 0% )
Task 1Introduction
Task 2What are dependencies?
Task 3Internal vs External
Task 4Securing External Dependencies
Task includes a deployable machine
Task 5Securing Internal Dependencies
Task 6Theory of a Dependency Confusion
Task 7Practical Exploitation of Dependency Confusion
Task includes a deployable machine
Task 8Conclusion
Ready to learn Cyber Security? Create your free account today!
The Dependency Management room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in