YoVDO

Securing the Container Pipeline at Salesforce - Docker Use Case

Offered By: Docker via YouTube

Tags

Docker Courses Cybersecurity Courses Access Control Courses Forensics Courses Containerization Courses Infrastructure Security Courses Network Monitoring Courses Vulnerability Management Courses Container Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive presentation on securing Docker container pipelines at Salesforce, focusing on customer trust and security. Learn about the challenges of containerization in high-sensitivity data environments and discover the infrastructure built to address these issues. Dive into topics such as securing the container pipeline, building security into architecture, monitoring, Docker forensics (disk, memory, network), and automation. Gain insights into live memory analysis capabilities used to ensure container and application integrity during execution. Cover various aspects of container security, including threat mitigation, access control, authentication, content trust, host and container hardening, vulnerability management, network monitoring, logging, disk activity monitoring, and forensics techniques. Understand the importance of process integrity and network security in containerized environments.

Syllabus

Intro
Container threats
Mitigations
Dr Security
Container Pipeline
Access Control Authentication
Content Trust
Docker Infrastructure
Host hardening
Container hardening
Group access
Dark Bench for Security
Vulnerability Management
Network Monitoring
Logs
Application logs
Disk activity monitoring
Disk forensics
Super timelines
Memory forensics
Memory forensics tools
What is memory forensics
components
process integrity
summary
thank you
Questions
Networking
Monitoring
Firewall
Container Security


Taught by

Docker

Related Courses

Cybersecurity Fundamentals
Rochester Institute of Technology via edX
Cyber Security in Manufacturing
University at Buffalo via Coursera
Cybersecurity
Rochester Institute of Technology via edX
Cyber Incident Response
Infosec via Coursera
SSCP Cert Prep: 4 Incident Response and Recovery
LinkedIn Learning