YoVDO

Pentesting with Docker

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Docker Courses Penetration Testing Courses Burp Suite Courses File Sharing Courses Port Forwarding Courses

Course Description

Overview

Explore the world of penetration testing using Docker in this 45-minute conference talk from BSidesLV 2015. Dive into Docker's architecture, registry, and practical applications for cybersecurity professionals. Learn how to build custom Docker images, create Dockerfiles, and leverage Docker on OS X. Discover techniques for port forwarding, running handlers, and sharing files and software within Docker containers. Gain insights into running Burp Suite and managing preferences in a containerized environment. Enhance your pentesting toolkit with Docker's powerful containerization capabilities.

Syllabus

Introduction
What is Docker
Why use Docker
Docker Architecture
Docker Registry
Build our own
Build the image
Docker files
Docker on OS X
Docker Port Forwarding
Running Handlers
Sharing Files
Sharing Software
Running Burp
Preferences


Taught by

BSidesLV

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent