YoVDO

Container Infrastructure Analysis with Trivy

Offered By: Pluralsight

Tags

Vulnerability Analysis Courses Docker Courses GitHub Actions Courses

Course Description

Overview

In this cyber security course you will learn how to find vulnerabilities in Docker images and how to prevent these vulnerabilities from occurring in the first place.

In this course, we will focus on automating docker image security scans. First, we will use Trivy (and a Github Action) to scan Dockerfiles within Github. Second, we will use Trivy to uncover a malicious image within a Docker registry. Third, we will perform an analysis on the malicious image to uncover the source of compromise. When you’re finished with this course, you’ll have the skills and knowledge to detect these techniques: Supply Chain Compromise (T1195), Implant Container Image (T1525).

Taught by

Zach Roof

Related Courses

Docker Mastery: with Kubernetes +Swarm from a Docker Captain
Udemy
Deploy Infra in the Cloud using Terraform
Udemy
Integrating Appium into a DevOps Pipeline
Pluralsight
Microsoft DevOps Solutions: Designing a Sensitive Information Strategy
Pluralsight
Testing and Deploying GatsbyJS Applications: Playbook
Pluralsight