Container Infrastructure Analysis with Trivy
Offered By: Pluralsight
Course Description
Overview
In this cyber security course you will learn how to find vulnerabilities in Docker images and how to prevent these vulnerabilities from occurring in the first place.
In this course, we will focus on automating docker image security scans. First, we will use Trivy (and a Github Action) to scan Dockerfiles within Github. Second, we will use Trivy to uncover a malicious image within a Docker registry. Third, we will perform an analysis on the malicious image to uncover the source of compromise. When you’re finished with this course, you’ll have the skills and knowledge to detect these techniques: Supply Chain Compromise (T1195), Implant Container Image (T1525).
In this course, we will focus on automating docker image security scans. First, we will use Trivy (and a Github Action) to scan Dockerfiles within Github. Second, we will use Trivy to uncover a malicious image within a Docker registry. Third, we will perform an analysis on the malicious image to uncover the source of compromise. When you’re finished with this course, you’ll have the skills and knowledge to detect these techniques: Supply Chain Compromise (T1195), Implant Container Image (T1525).
Taught by
Zach Roof
Related Courses
Introduction To Ethical HackingCodecademy Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX An Introduction to Ethical Hacking with Kali Linux
Packt via Coursera Ciberseguridad. Bases y estructuras para la protección de la información
Universidad Anáhuac via edX CVE Series: Spring4Shell (CVE-2022-22965)
Cybrary