Container Image Vulnerability Management - Strategies and Best Practices
Offered By: Docker via YouTube
Course Description
Overview
Discover effective strategies for addressing container image vulnerabilities in this 29-minute Docker conference talk. Learn how to systematically tackle security issues without becoming an operating system expert or rebuilding everything from scratch. Explore practical techniques for selecting trusted base images, managing vulnerabilities introduced by Dockerfile commands, and assessing your own code and dependencies. Gain valuable insights into Dockerfile best practices, the power of multistage builds, and advanced options like scratch and distroless images. Follow along as the speaker analyzes real-world container images from the ecosystem, providing you with a comprehensive pattern for enhancing the security of your containerized applications.
Syllabus
Your Container Has Vulnerabilities. Now What?
Taught by
Docker
Related Courses
MongoDB for .NET DevelopersMongoDB University Web Application Development – Capstone Course
University of New Mexico via Coursera Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent Reliable Cloud Infrastructure: Design and Process auf Deutsch
Google Cloud via Coursera Securing and Integrating Components of your Application 日本語版
Google Cloud via Coursera