Building a Secure Supply Chain
Offered By: Docker via YouTube
Course Description
Overview
Learn how to build a secure supply chain for Docker images in this 30-minute video from Docker. Explore the importance of image provenance, vulnerability scanning, and automated security processes. Discover how Docker Trusted Registry with Image Scanning can provide insights into vulnerabilities and create an audit trail. Gain knowledge on hardware lifecycle, Docker Content Trust, and see practical demonstrations to enhance your organization's security posture while maintaining efficiency.
Syllabus
Intro
Hardware Lifecycle
Docker
Docker Content Trust
Demo
Demonstration
Recap
Taught by
Docker
Related Courses
Startup EngineeringStanford University via Coursera Developing Scalable Apps in Java
Google via Udacity Cloud Computing Concepts, Part 1
University of Illinois at Urbana-Champaign via Coursera Cloud Networking
University of Illinois at Urbana-Champaign via Coursera Cloud Computing Concepts: Part 2
University of Illinois at Urbana-Champaign via Coursera