YoVDO

Don't Have a Meltdown - Practical Steps for Defending Your Applications

Offered By: Docker via YouTube

Tags

DockerCon Courses Docker Courses Code Quality Courses Application Security Courses Injection Attacks Courses Container Deployment Courses Security Testing Courses PCI Compliance Courses

Course Description

Overview

Explore practical steps for defending applications against security threats in this 39-minute Docker conference talk. Learn how to effectively protect container deployments from common attacks through live demonstrations, best practices, configuration techniques, and tools. Gain insights into mitigating risks related to authentication, injection, updates, sensitive data, and configuration. Understand the most critical security risks in applications and how to address them, drawing inspiration from the OWASP Top 10 and high-profile exploits. Discover the role of containers in enhancing security and prepare for future threats like Meltdown and Spectre. Cover topics such as code quality, GDPR compliance, security testing, PCI compliance, MicroScanner, security policies, host configuration, least privilege principles, and runtime protection.

Syllabus

Intro
Bad headlines
Docker! Docker! Docker!
Pipeline
Code quality
GDPR compliance
Security testing
PCI compliance
MicroScanner
Security policies
Host configuration
Least privilege
Runtime protection
Principles


Taught by

Docker

Related Courses

Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure
University of Illinois at Urbana-Champaign via Coursera
Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
Introduction aux conteneurs
Microsoft Virtual Academy via OpenClassrooms
The Docker for DevOps course: From development to production
Udemy
Windows Server 2016: Virtualization
Microsoft via edX