Securing Containers by Breaking in
Offered By: Pluralsight
Course Description
Overview
This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and your application dependencies.
There’s no better way to understand container security than seeing some live hacking This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and, of course, your application dependencies. Our hacks and advice will help you better understand the mistakes you could make, their implications and how you can avoid them.
There’s no better way to understand container security than seeing some live hacking This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and, of course, your application dependencies. Our hacks and advice will help you better understand the mistakes you could make, their implications and how you can avoid them.
Taught by
DevSecCon
Related Courses
Exploiting and Securing Vulnerabilities in Java ApplicationsUniversity of California, Davis via Coursera Secure Software Development Fundamentals
Linux Foundation via edX Learn what's new in PHP 7
Udemy Secure Software Lifecycle Management for CSSLP®
Pluralsight CSSLP Cert Prep: 4 Secure Software Implementation
LinkedIn Learning