Docker for Pentesting and Bug Bounty Hunting
Offered By: HackerSploit via YouTube
Course Description
Overview
Explore the use of Docker for pentesting and bug bounty hunting in this informative 37-minute video. Learn about Docker's importance, infrastructure, and advantages in cybersecurity. Follow step-by-step instructions to set up Kali Linux, OWASP Juice Shop, and Bug Bounty Toolkit using Docker containers. Gain insights into Docker Hub and running Docker images effectively. Discover how containerization can enhance your penetration testing and bug bounty hunting workflows, providing isolated environments for various security tools and targets.
Syllabus
Intro
What is Docker
Docker Infrastructure
Advantages
Installation
Docker Hub
Kali Linux
Docker Image
Running Docker
Bug Bounty Toolkit
Taught by
HackerSploit
Related Courses
Cloud Computing Applications, Part 1: Cloud Systems and InfrastructureUniversity of Illinois at Urbana-Champaign via Coursera Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX Introduction aux conteneurs
Microsoft Virtual Academy via OpenClassrooms The Docker for DevOps course: From development to production
Udemy Windows Server 2016: Virtualization
Microsoft via edX