Securing Containers by Breaking in
Offered By: Pluralsight
Course Description
Overview
This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and your application dependencies.
There’s no better way to understand container security than seeing some live hacking This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and, of course, your application dependencies. Our hacks and advice will help you better understand the mistakes you could make, their implications and how you can avoid them.
There’s no better way to understand container security than seeing some live hacking This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and, of course, your application dependencies. Our hacks and advice will help you better understand the mistakes you could make, their implications and how you can avoid them.
Taught by
DevSecCon
Related Courses
Advanced Reproducibility in Cancer InformaticsJohns Hopkins University via Coursera DevOps on Alibaba Cloud
Alibaba via Coursera Fundamentos de DevOps: Optimiza el desarrollo del software
Universidad Anáhuac via edX Implementar Aplicação Web no AWS Elastic Kubernetes Service
Coursera Project Network via Coursera Getting started with AWS Elastic Container Registry (ECR)
Coursera Project Network via Coursera