The Container Security Checklist - CNCF
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore a comprehensive container security checklist in this 52-minute CNCF conference talk. Learn about essential security measures for build machines, Docker files, and executable scanning. Discover the most dangerous flags, Linux capabilities, and dash privilege in running containers. Examine container hosts, Kubernetes security, and application secrets management. Gain insights into binary authorization for container instances and participate in a demo and Q&A session to reinforce your understanding of container security best practices.
Syllabus
Introduction
Lizs book
Build machines
Docker files
All executables
Scanning
Running Containers
Most Dangerous Flag
Linux Capabilities
Dash Privilege
Container Hosts
Kubernetes
QA
Application Secrets
Kubernetes Secrets
Demo
Questions
Container Instances
Binary Authorization
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Introduction to LinuxLinux Foundation via edX 操作系统原理(Operating Systems)
Peking University via Coursera Internet of Things: Setting Up Your DragonBoard™ Development Platform
University of California, San Diego via Coursera Information Security-3
Indian Institute of Technology Madras via Swayam Introduction to Embedded Systems Software and Development Environments
University of Colorado Boulder via Coursera