Pentesting with Docker
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the world of penetration testing using Docker in this 45-minute conference talk from BSidesLV 2015. Dive into Docker's architecture, registry, and practical applications for cybersecurity professionals. Learn how to build custom Docker images, create Dockerfiles, and leverage Docker on OS X. Discover techniques for port forwarding, running handlers, and sharing files and software within Docker containers. Gain insights into running Burp Suite and managing preferences in a containerized environment. Enhance your pentesting toolkit with Docker's powerful containerization capabilities.
Syllabus
Introduction
What is Docker
Why use Docker
Docker Architecture
Docker Registry
Build our own
Build the image
Docker files
Docker on OS X
Docker Port Forwarding
Running Handlers
Sharing Files
Sharing Software
Running Burp
Preferences
Taught by
BSidesLV
Related Courses
Cloud Computing Applications, Part 1: Cloud Systems and InfrastructureUniversity of Illinois at Urbana-Champaign via Coursera Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX Introduction aux conteneurs
Microsoft Virtual Academy via OpenClassrooms The Docker for DevOps course: From development to production
Udemy Windows Server 2016: Virtualization
Microsoft via edX