YoVDO

How to Use Mirantis Container Runtime to Secure Business-Critical Applications

Offered By: Mirantis via YouTube

Tags

Container Security Courses DevOps Courses End-to-End Encryption Courses Cloud Security Courses CI/CD Pipelines Courses Vulnerability Scanning Courses Secure Software Supply Chain Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover how to secure business-critical applications using Mirantis Container Runtime in this informative 33-minute webinar. Learn about the importance of a validated cryptographic module for end-to-end encryption and secure mutual TLS authentication. Explore the integration of container runtime with CI/CD pipelines for signed image promotion and vulnerability scanning in conjunction with Mirantis Secure Registry. Gain insights into building a secure software supply chain for both Linux and Windows environments, essential for protecting data in mission-critical settings. Follow along as the presenter explains the DevSecOps approach and provides a comprehensive overview of Mirantis Container Runtime's enterprise features, concluding with a quick recap of key points covered.

Syllabus

- Introducing our presenter
- What this webinar will cover
- The importance of a validated cryptographic module
- Encryption via validated cryptographic module
- DevSecOps approach explained
- Quick recap
- Outro


Taught by

Mirantis

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera