Loading Course Schedule...
PT26727
Training Summary
Building containerized applications has revolutionized the process of developing and running microservices. Instead of worrying about underlying system dependencies, container images include all of the necessary components to run an application on any platform, they are much smaller which makes them more portable, and enables simplified autoscaling.
Docker is designed to make it easier to build and run distributed Microservice applications, but this design comes with security challenges.
There are many different aspects of security when working with Docker images, containers and orchestration.
In this class you will learn through lecture and hands-on-labs best practices for securing the Docker host, base image, application images and registry. We will also discuss challenges and solutions to scaling containers in a production deployment.
Prerequisites
There are no prerequisites for this course.
Duration
2 Days/Lecture & Lab
Audience
The audience for this class is developers, DevOps, architects, and any other Engineering personnel interested in running secure containerized applications in a production environment. Attendees will learn how to design and secure their containerized Docker/Kubernetes deployments.
Course Topics
- Docker Security Overview
- Docker Image Security
- Container Registry Security
- Exploring The Update Framework (TUF)
- Docker Run-time Security
- Restrict Linux capabilities
- CIS Benchmarks
- Docker in Production Security Best Practices