YoVDO

Using Docker to Secure Traditional Applications Without Code Changes

Offered By: Docker via YouTube

Tags

Docker Courses Encryption Courses Application Security Courses Containerization Courses Vulnerability Scanning Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to enhance security for legacy applications using Docker without modifying their code. Explore techniques to modernize and containerize traditional apps, making them more portable, cost-efficient, and secure. Discover Docker Enterprise Edition's security features, including isolation, encryption, scanning, and signing, to reduce attack surface area and mitigate potential threats. Through live demonstrations, gain insights into implementing various security configurations and responding to incoming threats effectively. Understand the challenges of maintaining critical legacy applications and how containerization can address security concerns while preserving business functionality.

Syllabus

Intro
A realization
The impact of data breaches
More data more problems
Show hands
Security was the problem
We are killing people
Security
Engineers and Operations
Precrash Testing
Free Crash Check
Constant Monitoring
The Driver
The Han System
Fire Resistant Suits
Fire Suppression System


Taught by

Docker

Related Courses

Fundamentals of Containers, Kubernetes, and Red Hat OpenShift
Red Hat via edX
Configuration Management for Containerized Delivery
Microsoft via edX
Getting Started with Google Kubernetes Engine - Español
Google Cloud via Coursera
Getting Started with Google Kubernetes Engine - 日本語版
Google Cloud via Coursera
Architecting with Google Kubernetes Engine: Foundations en Español
Google Cloud via Coursera