Docker Skills: Advanced Docker Security

Docker    |    Intermediate
  • 13 videos | 1h 7m 17s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 47 users Rating 4.3 of 47 users (47)
Security planning is a critical part of configuring and hosting Docker images securely. This course will focus on ensuring the Docker images and environment are not vulnerable to unauthorized access and security attacks. In this course, you'll learn how traditional software development models such as client server applications and REST-based web services are relevant to Docker. You'll examine the features, benefits, and challenges of using virtual machines versus Docker to deploy applications. Next, you'll explore some major Docker security concerns and methods for hardening Docker containers. You'll move on to learn about developing a security plan for Docker, specifically during the design phases of a project. Finally, you'll learn about Docker Seccomp and AppArmor profiles and why are they important.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe some of the traditional software development models such as client server applications and rest-based web services, as well as how much of each model still applies to docker
    Compare the features, benefits, and challenges of using virtual machines versus docker to deploy applications
    Describe some major docker security concerns and methods for hardening docker containers
    Describe aspects of docker security planning, specifically during the design phases of a project, such as daemons, kernel namespaces, control groups, trust signatures, and underlying infrastructure dependencies
    Describe the purpose of docker content trust and how to digitally sign images
    Describe the purpose of the docker daemon and methods for ensuring it is secure
  • Describe the purpose of the docker kernel namespaces and methods for ensuring they are secure
    Describe docker seccomp profiles and why are they important
    Describe apparmor profiles and why are they important
    Configure seccomp security profiles for docker
    Configure apparmor security profiles for docker
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 53s
  • 4m 44s
    During this video, you will learn how to describe some of the traditional software development models such as client server applications and REST-based web services, as well as how much of each model still applies to Docker. FREE ACCESS
  • Locked
    3.  Comparing Docker and Virtual Machines
    4m 33s
    Find out how to compare the features, benefits, and challenges of using virtual machines versus Docker to deploy applications. FREE ACCESS
  • Locked
    4.  Hardening Docker Containers
    4m 4s
    Learn how to describe some major security concerns with Docker and methods for hardening Docker containers. FREE ACCESS
  • Locked
    5.  Docker Living Security Plan
    7m 21s
    In this video, you will learn how to describe aspects of Docker security planning, specifically during the design phases of a project, such as daemons, kernel namespaces, control groups, trust signatures, and underlying infrastructure dependencies. FREE ACCESS
  • Locked
    6.  Docker Trusted Images
    6m 6s
    During this video, you will discover the purpose of Docker content trust and how to digitally sign images. FREE ACCESS
  • Locked
    7.  Docker Daemon Security
    5m 41s
    In this video, you will learn how to describe the purpose of the Docker daemon and how to ensure it is secure. FREE ACCESS
  • Locked
    8.  Docker Namespace Security
    6m 57s
    Discover how to describe the purpose of the Docker kernel namespaces and how to ensure they are secure. FREE ACCESS
  • Locked
    9.  Docker Seccomp
    4m 8s
    In this video, you will discover Docker Seccomp profiles and why they are important. FREE ACCESS
  • Locked
    10.  Docker AppArmor
    4m 56s
    After completing this video, you will be able to describe AppArmor profiles and why they are important. FREE ACCESS
  • Locked
    11.  Configuring Docker Seccomp
    6m 19s
    In this video, find out how to configure Seccomp security profiles for Docker containers. FREE ACCESS
  • Locked
    12.  Configuring Docker AppArmor
    10m 1s
    Upon completion of this video, you will be able to configure AppArmor security profiles for Docker containers. FREE ACCESS
  • Locked
    13.  Course Summary
    35s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 239 users Rating 4.6 of 239 users (239)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)
Rating 4.6 of 1111 users Rating 4.6 of 1111 users (1111)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 392 users Rating 4.4 of 392 users (392)
Rating 4.4 of 80 users Rating 4.4 of 80 users (80)
Rating 4.5 of 53 users Rating 4.5 of 53 users (53)