YoVDO

Container Security Reality Check - The Container Is Only the Beginning

Offered By: Red Hat via YouTube

Tags

Red Hat Summit Courses DevOps Courses Microservices Courses Risk Management Courses OpenShift Courses Container Security Courses

Course Description

Overview

Explore container security realities and best practices in this comprehensive 56-minute talk by a Red Hat container expert. Learn how enterprise IT can leverage containers to boost business agility, implement DevOps processes, and enhance security and control. Discover the security and performance implications of container-based operating systems, images, and registries. Gain insights into managing container lifecycles, addressing security issues, and adapting to changing functional requirements. Understand how to integrate container infrastructure management with existing systems. Delve into topics such as digital enterprise security, evolving IT landscapes, agility metrics, risk management, application trust, enterprise-scale standardization, and the operational model for containerized applications. Debunk container myths and misperceptions while gaining a clear understanding of how containers can transform your organization's approach to application development and deployment.

Syllabus

Intro
How Containers help secure the Digital Enterprise
IT must evolve All businesses must become software companies
New Success Metrics for the CIO
Agility
Customer satisfaction
Infrastructure for the digital business
What containers deliver
Confidence to Deliver
Security is Top Priority and Challenge
Top Breaches 2015
Security Drives Disconnect Between Dev and Ops
Security Is About Managing Risk
Start with Security Fundamentals
Traditional Strategies Under Pressure
Managing your Applications What (who) do you trust?
Enterprise Scale Keeping up-standardize (components) and automate
Enabling Autonomy Diversity. Responsibilities change.
Decompose Applications Complexity becomes an analytics problem
Operational Model for the Enterprise
One Operational Model Any Application, Anywhere
Containerized Application Platform
Abstract Across Hybrid Infrastructure
Infrastructure Security Dependencies
Platform Manages Security
Open Content Ecosystem
OpenShift Container Platform
Dynamic Trust
Red Hat Container Certification UNTRUSTED
Deployment Automation
Eternal Spiral Of Change
Containers enable Autonomy And reduce attack surface
What's Wrong With VMs?
Rethinking Security Strategy


Taught by

Red Hat

Related Courses

Introduction to Finance
University of Michigan via Coursera
Information Security and Risk Management in Context
University of Washington via Coursera
Financial Engineering and Risk Management
Columbia University via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Caries Management by Risk Assessment (CAMBRA)
University of California, San Francisco via Coursera