YoVDO

Protective Technology with Dockle

Offered By: Pluralsight

Tags

Cybersecurity Courses Docker Courses Continuous Integration Courses NIST Cybersecurity Framework Courses

Course Description

Overview

Learn all about configuring and validating hardened best-practice docker images. In this course, you will learn the setup, configuration, and validation of Dockle in an enterprise environment.

Would you like to start implementing NIST cybersecurity framework protective technology tools? In this course, Protective Technology with Dockle, you’ll cover how to utilize Dockle to secure a live enterprise environment. First, you’ll see how to use Dockle to check Docker images. Next, you’ll learn to apply specific configurations as well as understand Dockle’s output. Finally, you’ll explore using Dockle in a continuous integration environment. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.

Syllabus

  • Course Overview 1min
  • Setting up, Configuring, and Using Dockle 27mins
  • Additional Tool Capabilities 3mins

Taught by

Peter Mosmans

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network