Securing the Docker Host
Offered By: HackerSploit via YouTube
Course Description
Overview
Learn how to secure the Docker host operating system and set up audit rules for various Docker artifacts in this 43-minute video. Explore the best OS options for hosting Docker, including minimal operating systems, and dive into the Linux audit framework. Discover essential auditing tools and watch a practical demonstration of implementing security measures. Gain valuable insights into Docker security essentials, including the use of Docker Bench for Security, Lynis, and the Docker CIS Benchmark. Follow along with timestamped sections covering introduction, topic overview, OS considerations, audit frameworks, and hands-on implementation.
Syllabus
Introduction.
What we will be covering.
Best OS for hosting Docker.
Minimal operating systems.
The Linux audit framework.
Auditing Tools.
Practical Demonstration.
Taught by
HackerSploit
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network