YoVDO

How to Use Mirantis Container Runtime to Secure Business-Critical Applications

Offered By: Mirantis via YouTube

Tags

Container Security Courses DevOps Courses End-to-End Encryption Courses Cloud Security Courses CI/CD Pipelines Courses Vulnerability Scanning Courses Secure Software Supply Chain Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover how to secure business-critical applications using Mirantis Container Runtime in this informative 33-minute webinar. Learn about the importance of a validated cryptographic module for end-to-end encryption and secure mutual TLS authentication. Explore the integration of container runtime with CI/CD pipelines for signed image promotion and vulnerability scanning in conjunction with Mirantis Secure Registry. Gain insights into building a secure software supply chain for both Linux and Windows environments, essential for protecting data in mission-critical settings. Follow along as the presenter explains the DevSecOps approach and provides a comprehensive overview of Mirantis Container Runtime's enterprise features, concluding with a quick recap of key points covered.

Syllabus

- Introducing our presenter
- What this webinar will cover
- The importance of a validated cryptographic module
- Encryption via validated cryptographic module
- DevSecOps approach explained
- Quick recap
- Outro


Taught by

Mirantis

Related Courses

CompTIA Security+ Certification Prep
A Cloud Guru
Secure Container Host Operating System
A Cloud Guru
AWS: Infrastructure Security
Whizlabs via Coursera
Integrated Cybersecurity: From Physical Safeguards to Digital Forensics and Governance
University System of Maryland via edX
Designing Robust Information System Security Architectures
LearnQuest via Coursera