Docker Container Security Tips and Techniques IT Pros Need to know
About Individual Course:
10 Learners Have Enrolled For This Course
When you subscribe, you get:
Learn Subscription plan gives you access to this course and over 836 other popular courses
Now Only $39.99 Regular Price $44.99
Now Only $39.99 Regular Price $44.99/ Month
10 Learners Have Enrolled For This Course
You have already taken demo for this course.
If you want to get access to demo again, feel free to contact our support at (855) 800-8240
About this course:
In this webinar Joseph Holbrook, a Cloud Native Subject Matter Expert(SME) will provide insight into “Docker Container Security Tips and Techniques IT Pros need to know” to provide for a well fortified container environment. Utilizing the common but also not so common tips and techniques such as using minimal images that bundle on needed tools your security footprint can ship the most secure images or using a signed and verified image to mitigate MITM attacks. Docker security assessment process will enable your enterprise to prevent common exploits but also secure your container resources so that your minimizing the impact of any potential breaches that do occur as well. In this webinar we will review common tips and techniques such as using an alpha feature in Docker for managing your secrets, metadata labels, linters, running security tools and more. .
Also, covered will the top 5 container security tools that Docker users need to use to help your Docker deployments. As an added bonus—We will discuss how Google Cloud Kubernetes Engine could be used to not only learn how to implement container security but also extend to your on premises deployments.
- That according to the Open Source Security Report in 2019 that out of each of the top ten Docker images inspected on Docker Hub contained known vulnerabilities. .
- That you can Use Snyk to monitor and alert your DevOps team to newly disclosed vulnerabilities in docker images via the monitor command.
- Docker has fundamentally changed the way DevOps teams now create, manage, and operate your container-based applications and security is now at the forefront.
- The most damaging container attacks generally involve a kill chain, or a series of malicious activities, which together achieve the attackers goal quite effectively.
- Using the minimal images that bundle only the necessary system tools and libraries required to run your project will minimize the attack surface for attackers.
- There are no prerequisites required for this course
|Learning Style||Self-Paced Learning|
|Course Duration||1 Hour|
(The Cloud Tech Guy)
Joseph has been in the IT field since 1993, when he was exposed to several HPUX systems on board a U.S. Navy flagship. He has migrated from the UNIX world to storage area networking (SAN), enterprise virtualization, and cloud architectures, and now specializes in blockchain and cryptocurrency. He previously worked for numerous companies such as HDS, 3PAR, Brocade, HP, EMC, Northrup Grumman, ViON, Ibasis.net, Chematch.com, SAIC, and Siemens Nixdorf.
This Subscription Includes:
250+ Virtual Instructor-Led Courses
Virtual Classroom Courses
Our virtual instructor-led courses give you access to live instructors training you with other live students in a virtual classroom environment.< Play Video >
900+ Self-Paced Courses
Online Self-Paced Courses
Take self-paced online courses at your convenience and own pace, with unlimited access to courses in various emerging technologies.
E-books, blogs, & case studies
E-books blogs, case studies, articles
As part of informal learning, our platform will recommend E-books, whitepapers, case studies, articles, and videos. This is AI curated content closely aligned with your learning objectives.
Set yourself on the right path with self-assessments that allow you to gauge what you already know. Assessments then personalize your learning paths, and allow you to focus only on what you need to succeed.
Full Learning Dashboard & Analytics
Access all your enrolled, completed, course statistics, and community discussions from one centralized and intuitive learning dashboard with built in analytics, course tracking, time spent, and more.
Engage with other learners where you can directly chat, ask questions, and socialize with other learners experts and instructors on a course subject.
Videos and lectures only go so far. Get real world, hands-on practice with virtual labs (not available for all courses).
Mentoring & Discussions
Live Instructor Mentoring & Support
Get your IT problems solved through a community of mentors, experts and peers. Get live help from experts to answer questions on course material or guidance on a project.
Start a learning pathway towards understanding and mastering your career. With QuickStart career paths, you can fully understanding and being the best in your field.
Access to AI curated content from various content publishers which can help in self-directed learning.