YoVDO

Securing Containers by Breaking in

Offered By: Pluralsight

Tags

Penetration Testing Courses Docker Courses Secure Coding Practices Courses Container Security Courses

Course Description

Overview

This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and your application dependencies.

There’s no better way to understand container security than seeing some live hacking This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and, of course, your application dependencies. Our hacks and advice will help you better understand the mistakes you could make, their implications and how you can avoid them.

Taught by

DevSecCon

Related Courses

Advanced Reproducibility in Cancer Informatics
Johns Hopkins University via Coursera
DevOps on Alibaba Cloud
Alibaba via Coursera
Fundamentos de DevOps: Optimiza el desarrollo del software
Universidad Anáhuac via edX
Implementar Aplicação Web no AWS Elastic Kubernetes Service
Coursera Project Network via Coursera
Getting started with AWS Elastic Container Registry (ECR)
Coursera Project Network via Coursera