PDP Url

Docker Container Security Tips and Techniques IT Pros Need to know

Cloud Native Subject Matter Expert(SME) will provide insight into “Docker Container Security Tips and Techniques IT Pros need to know” to provide for a well fortified container environment.

Self-Paced

Learning Style

Beginner

Difficulty

1 Hour

Course Duration

Course Info

Download PDF

Certificate

See Sample

tab
About Individual Course:
  • Individual course plan gives you access to this course
$99.00
$99.00
/ Each
When you subscribe, you get:
Learn Subscription plan gives you access to this course and over 902 other popular courses
On Sale!
Now Only $39.99 Regular Price $44.99
Now Only $39.99 Regular Price $44.99
/ Month
Team
Pricing
  • Buy 5-9 Enrollments And Save 68% ($12.74 monthly.)
  • Buy 10-19 Enrollments And Save 72% ($11.24 monthly.)
  • Buy 20-above Enrollments And Save 78% ($8.99 monthly.)
Cloud Native Subject Matter Expert(SME) will provide insight into “Docker Container Security Tips and Techniques IT Pros need to know” to provide for a well fortified container environment.

Course Information

About this course:

In this webinar Joseph Holbrook, a Cloud Native Subject Matter Expert(SME) will provide insight into “Docker Container Security Tips and Techniques IT Pros need to know” to provide for a well fortified container environment. Utilizing the common but also not so common tips and techniques such as using minimal images that bundle on needed tools your security footprint can ship the most secure images or using a signed and verified image to mitigate MITM attacks. Docker security assessment process will enable your enterprise to prevent common exploits but also secure your container resources so that your minimizing the impact of any potential breaches that do occur as well. In this webinar we will review common tips and techniques such as using an alpha feature in Docker for managing your secrets, metadata labels, linters, running security tools and more. .

Also, covered will the top 5 container security tools that Docker users need to use to help your Docker deployments. As an added bonus—We will discuss how Google Cloud Kubernetes Engine could be used to not only learn how to implement container security but also extend to your on premises deployments.

Course Objective:

  • That according to the Open Source Security Report in 2019 that out of each of the top ten Docker images inspected on Docker Hub contained known vulnerabilities. .
  • That you can Use Snyk to monitor and alert your DevOps team to newly disclosed vulnerabilities in docker images via the monitor command.
  • Docker has fundamentally changed the way DevOps teams now create, manage, and operate your container-based applications and security is now at the forefront.
  • The most damaging container attacks generally involve a kill chain, or a series of malicious activities, which together achieve the attackers goal quite effectively.
  • Using the minimal images that bundle only the necessary system tools and libraries required to run your project will minimize the attack surface for attackers.

Prerequisite:

  • There are no prerequisites required for this course

Outline

Course Authored By:

Author

Joseph Holbrook (The Cloud Tech Guy)

Joseph has been in the IT field since 1993, when he was exposed to several HPUX systems on board a U.S. Navy flagship. He has migrated from the UNIX world to storage area networking (SAN), enterprise virtualization, and cloud architectures, and now specializes in blockchain and cryptocurrency. He previously worked for numerous companies such as HDS, 3PAR, Brocade, HP, EMC, Northrup Grumman, ViON, Ibasis.net, Chematch.com, SAIC, and Siemens Nixdorf.

More Information

More Information
Subjects Information Security
Lab Access No
Learning Style Self-Paced Learning
Difficulty Beginner
Course Duration 1 Hour
Language English

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Contact A Learning Consultant


click here