YoVDO

Securing the Docker Host

Offered By: HackerSploit via YouTube

Tags

Docker Courses Cybersecurity Courses Operating Systems Courses Docker Security Courses

Course Description

Overview

Learn how to secure the Docker host operating system and set up audit rules for various Docker artifacts in this 43-minute video. Explore the best OS options for hosting Docker, including minimal operating systems, and dive into the Linux audit framework. Discover essential auditing tools and watch a practical demonstration of implementing security measures. Gain valuable insights into Docker security essentials, including the use of Docker Bench for Security, Lynis, and the Docker CIS Benchmark. Follow along with timestamped sections covering introduction, topic overview, OS considerations, audit frameworks, and hands-on implementation.

Syllabus

Introduction.
What we will be covering.
Best OS for hosting Docker.
Minimal operating systems.
The Linux audit framework.
Auditing Tools.
Practical Demonstration.


Taught by

HackerSploit

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera