Container Image Vulnerability Management - Strategies and Best Practices
Offered By: Docker via YouTube
Course Description
Overview
Discover effective strategies for addressing container image vulnerabilities in this 29-minute Docker conference talk. Learn how to systematically tackle security issues without becoming an operating system expert or rebuilding everything from scratch. Explore practical techniques for selecting trusted base images, managing vulnerabilities introduced by Dockerfile commands, and assessing your own code and dependencies. Gain valuable insights into Dockerfile best practices, the power of multistage builds, and advanced options like scratch and distroless images. Follow along as the speaker analyzes real-world container images from the ecosystem, providing you with a comprehensive pattern for enhancing the security of your containerized applications.
Syllabus
Your Container Has Vulnerabilities. Now What?
Taught by
Docker
Related Courses
Maintaining Deployment Security in Microsoft AzurePluralsight Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning Securing Containers and Kubernetes Ecosystem
LinkedIn Learning Performing DevSecOps Automated Security Testing
Pluralsight