YoVDO

Securing Containers by Breaking in

Offered By: Pluralsight

Tags

Penetration Testing Courses Docker Courses Secure Coding Practices Courses Container Security Courses

Course Description

Overview

This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and your application dependencies.

There’s no better way to understand container security than seeing some live hacking This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and, of course, your application dependencies. Our hacks and advice will help you better understand the mistakes you could make, their implications and how you can avoid them.

Taught by

DevSecCon

Related Courses

Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure
University of Illinois at Urbana-Champaign via Coursera
Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
Introduction aux conteneurs
Microsoft Virtual Academy via OpenClassrooms
The Docker for DevOps course: From development to production
Udemy
Windows Server 2016: Virtualization
Microsoft via edX