Container Image Vulnerability Management - Strategies and Best Practices
Offered By: Docker via YouTube
Course Description
Overview
Discover effective strategies for addressing container image vulnerabilities in this 29-minute Docker conference talk. Learn how to systematically tackle security issues without becoming an operating system expert or rebuilding everything from scratch. Explore practical techniques for selecting trusted base images, managing vulnerabilities introduced by Dockerfile commands, and assessing your own code and dependencies. Gain valuable insights into Dockerfile best practices, the power of multistage builds, and advanced options like scratch and distroless images. Follow along as the speaker analyzes real-world container images from the ecosystem, providing you with a comprehensive pattern for enhancing the security of your containerized applications.
Syllabus
Your Container Has Vulnerabilities. Now What?
Taught by
Docker
Related Courses
The Foundations of CybersecurityUniversity System of Georgia via Coursera Introduction to Cybersecurity
SecurityScoreCard via Udacity TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Udemy Fundamentals of Internet Security | Secure Your Environment
Udemy Ciberseguridad en linea
Udemy