YoVDO

Securing the Docker Host

Offered By: HackerSploit via YouTube

Tags

Docker Courses Cybersecurity Courses Operating Systems Courses Docker Security Courses

Course Description

Overview

Learn how to secure the Docker host operating system and set up audit rules for various Docker artifacts in this 43-minute video. Explore the best OS options for hosting Docker, including minimal operating systems, and dive into the Linux audit framework. Discover essential auditing tools and watch a practical demonstration of implementing security measures. Gain valuable insights into Docker security essentials, including the use of Docker Bench for Security, Lynis, and the Docker CIS Benchmark. Follow along with timestamped sections covering introduction, topic overview, OS considerations, audit frameworks, and hands-on implementation.

Syllabus

Introduction.
What we will be covering.
Best OS for hosting Docker.
Minimal operating systems.
The Linux audit framework.
Auditing Tools.
Practical Demonstration.


Taught by

HackerSploit

Related Courses

Docker - Deep Dive
A Cloud Guru
Scenario Based Docker Security
A Cloud Guru
Docker Essential Training: 6 Security
LinkedIn Learning
Implementing Docker Security
Pluralsight
Docker Certified Associate 2023
Udemy