YoVDO

Building a Secure Supply Chain

Offered By: Docker via YouTube

Tags

DockerCon Courses Cybersecurity Courses DevOps Courses Docker Courses Supply Chain Security Courses Vulnerability Scanning Courses

Course Description

Overview

Learn how to build a secure supply chain for Docker images in this 30-minute video from Docker. Explore the importance of image provenance, vulnerability scanning, and automated security processes. Discover how Docker Trusted Registry with Image Scanning can provide insights into vulnerabilities and create an audit trail. Gain knowledge on hardware lifecycle, Docker Content Trust, and see practical demonstrations to enhance your organization's security posture while maintaining efficiency.

Syllabus

Intro
Hardware Lifecycle
Docker
Docker Content Trust
Demo
Demonstration
Recap


Taught by

Docker

Related Courses

Startup Engineering
Stanford University via Coursera
Developing Scalable Apps in Java
Google via Udacity
Cloud Computing Concepts, Part 1
University of Illinois at Urbana-Champaign via Coursera
Cloud Networking
University of Illinois at Urbana-Champaign via Coursera
Cloud Computing Concepts: Part 2
University of Illinois at Urbana-Champaign via Coursera