Don't Have a Meltdown - Practical Steps for Defending Your Applications
Offered By: Docker via YouTube
Course Description
Overview
Explore practical steps for defending applications against security threats in this 39-minute Docker conference talk. Learn how to effectively protect container deployments from common attacks through live demonstrations, best practices, configuration techniques, and tools. Gain insights into mitigating risks related to authentication, injection, updates, sensitive data, and configuration. Understand the most critical security risks in applications and how to address them, drawing inspiration from the OWASP Top 10 and high-profile exploits. Discover the role of containers in enhancing security and prepare for future threats like Meltdown and Spectre. Cover topics such as code quality, GDPR compliance, security testing, PCI compliance, MicroScanner, security policies, host configuration, least privilege principles, and runtime protection.
Syllabus
Intro
Bad headlines
Docker! Docker! Docker!
Pipeline
Code quality
GDPR compliance
Security testing
PCI compliance
MicroScanner
Security policies
Host configuration
Least privilege
Runtime protection
Principles
Taught by
Docker
Related Courses
Cloud Computing Applications, Part 1: Cloud Systems and InfrastructureUniversity of Illinois at Urbana-Champaign via Coursera Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX Introduction aux conteneurs
Microsoft Virtual Academy via OpenClassrooms The Docker for DevOps course: From development to production
Udemy Windows Server 2016: Virtualization
Microsoft via edX