How to Use Mirantis Container Runtime to Secure Business-Critical Applications
Offered By: Mirantis via YouTube
Course Description
Overview
Discover how to secure business-critical applications using Mirantis Container Runtime in this informative 33-minute webinar. Learn about the importance of a validated cryptographic module for end-to-end encryption and secure mutual TLS authentication. Explore the integration of container runtime with CI/CD pipelines for signed image promotion and vulnerability scanning in conjunction with Mirantis Secure Registry. Gain insights into building a secure software supply chain for both Linux and Windows environments, essential for protecting data in mission-critical settings. Follow along as the presenter explains the DevSecOps approach and provides a comprehensive overview of Mirantis Container Runtime's enterprise features, concluding with a quick recap of key points covered.
Syllabus
- Introducing our presenter
- What this webinar will cover
- The importance of a validated cryptographic module
- Encryption via validated cryptographic module
- DevSecOps approach explained
- Quick recap
- Outro
Taught by
Mirantis
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera