- Course
Basics of Supply Chain Security
Learn how to spot and respond to threats hiding in trusted vendor relationships. This course shows you how to identify, assess, and reduce supply chain security risks across both digital systems and physical operations.
- Course
Basics of Supply Chain Security
Learn how to spot and respond to threats hiding in trusted vendor relationships. This course shows you how to identify, assess, and reduce supply chain security risks across both digital systems and physical operations.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Modern organizations face supply chain security threats as attackers exploit vendor relationships and third-party dependencies to achieve their goals. In this course, Basics of Supply Chain Security, you'll learn to assess and secure your organization's supply chain dependencies and vendor relationships. First, you'll explore the structure and components of modern supply chains, mapping both digital and physical dependencies while identifying key stakeholders, ranging from software vendors to cloud service providers, and understanding how products, data, and services flow across organizational boundaries. Next, you’ll discover how to analyze real-world supply chain attacks, such as those involving Target, SolarWinds, and Log4J, examining their business impact and learning to distinguish between third-party risks and internal security threats. Finally, you'll learn how to recognize heightened risk scenarios, particularly in critical infrastructure sectors where single points of failure can cascade into national-scale disruptions affecting energy, healthcare, and transportation systems. When you're finished with this course, you'll have the skills and knowledge of supply chain security needed to evaluate vendor relationships, implement comprehensive risk management frameworks, and protect your organization from the growing threat of supply chain compromise.