How to Use Mirantis Container Runtime to Secure Business-Critical Applications
Offered By: Mirantis via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover how to secure business-critical applications using Mirantis Container Runtime in this informative 33-minute webinar. Learn about the importance of a validated cryptographic module for end-to-end encryption and secure mutual TLS authentication. Explore the integration of container runtime with CI/CD pipelines for signed image promotion and vulnerability scanning in conjunction with Mirantis Secure Registry. Gain insights into building a secure software supply chain for both Linux and Windows environments, essential for protecting data in mission-critical settings. Follow along as the presenter explains the DevSecOps approach and provides a comprehensive overview of Mirantis Container Runtime's enterprise features, concluding with a quick recap of key points covered.
Syllabus
- Introducing our presenter
- What this webinar will cover
- The importance of a validated cryptographic module
- Encryption via validated cryptographic module
- DevSecOps approach explained
- Quick recap
- Outro
Taught by
Mirantis
Related Courses
CompTIA Security+ Certification PrepA Cloud Guru Secure Container Host Operating System
A Cloud Guru AWS: Infrastructure Security
Whizlabs via Coursera Integrated Cybersecurity: From Physical Safeguards to Digital Forensics and Governance
University System of Maryland via edX Designing Robust Information System Security Architectures
LearnQuest via Coursera