YoVDO

Protective Technology with Dockle

Offered By: Pluralsight

Tags

Cybersecurity Courses Docker Courses Continuous Integration Courses NIST Cybersecurity Framework Courses

Course Description

Overview

Learn all about configuring and validating hardened best-practice docker images. In this course, you will learn the setup, configuration, and validation of Dockle in an enterprise environment.

Would you like to start implementing NIST cybersecurity framework protective technology tools? In this course, Protective Technology with Dockle, you’ll cover how to utilize Dockle to secure a live enterprise environment. First, you’ll see how to use Dockle to check Docker images. Next, you’ll learn to apply specific configurations as well as understand Dockle’s output. Finally, you’ll explore using Dockle in a continuous integration environment. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.

Syllabus

  • Course Overview 1min
  • Setting up, Configuring, and Using Dockle 27mins
  • Additional Tool Capabilities 3mins

Taught by

Peter Mosmans

Related Courses

Web Engineering III: Quality Assurance
Technische Hochschule Mittelhessen via iversity
Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
DevOps for Developers: How to Get Started
Microsoft via edX
Accelerate Software Delivery using DevOps
Microsoft via edX
Building R Packages
Johns Hopkins University via Coursera