The Container Security Checklist - CNCF
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore a comprehensive container security checklist in this 52-minute CNCF conference talk. Learn about essential security measures for build machines, Docker files, and executable scanning. Discover the most dangerous flags, Linux capabilities, and dash privilege in running containers. Examine container hosts, Kubernetes security, and application secrets management. Gain insights into binary authorization for container instances and participate in a demo and Q&A session to reinforce your understanding of container security best practices.
Syllabus
Introduction
Lizs book
Build machines
Docker files
All executables
Scanning
Running Containers
Most Dangerous Flag
Linux Capabilities
Dash Privilege
Container Hosts
Kubernetes
QA
Application Secrets
Kubernetes Secrets
Demo
Questions
Container Instances
Binary Authorization
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network