YoVDO

Securing the Docker Host

Offered By: HackerSploit via YouTube

Tags

Docker Courses Cybersecurity Courses Operating Systems Courses Docker Security Courses

Course Description

Overview

Learn how to secure the Docker host operating system and set up audit rules for various Docker artifacts in this 43-minute video. Explore the best OS options for hosting Docker, including minimal operating systems, and dive into the Linux audit framework. Discover essential auditing tools and watch a practical demonstration of implementing security measures. Gain valuable insights into Docker security essentials, including the use of Docker Bench for Security, Lynis, and the Docker CIS Benchmark. Follow along with timestamped sections covering introduction, topic overview, OS considerations, audit frameworks, and hands-on implementation.

Syllabus

Introduction.
What we will be covering.
Best OS for hosting Docker.
Minimal operating systems.
The Linux audit framework.
Auditing Tools.
Practical Demonstration.


Taught by

HackerSploit

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network