YoVDO

Building a Secure Supply Chain

Offered By: Docker via YouTube

Tags

DockerCon Courses Cybersecurity Courses DevOps Courses Docker Courses Supply Chain Security Courses Vulnerability Scanning Courses

Course Description

Overview

Learn how to build a secure supply chain for Docker images in this 30-minute video from Docker. Explore the importance of image provenance, vulnerability scanning, and automated security processes. Discover how Docker Trusted Registry with Image Scanning can provide insights into vulnerabilities and create an audit trail. Gain knowledge on hardware lifecycle, Docker Content Trust, and see practical demonstrations to enhance your organization's security posture while maintaining efficiency.

Syllabus

Intro
Hardware Lifecycle
Docker
Docker Content Trust
Demo
Demonstration
Recap


Taught by

Docker

Related Courses

Penetration Testing - Discovering Vulnerabilities
New York University (NYU) via edX
The Complete Cyber Security Course : Network Security!
Udemy
Certified Ethical Hacker دورة إعداد الـ
Udemy
The Ethical Hacking Starter Kit: 12 Techniques
Udemy
Technical Weakness Identification with Nikto
Pluralsight