Size: 347 MB

Description

This course introduces students to the security concepts associated with Docker builds. Docker is a popular software and it is widely used in Information Technology Industry. It’s popularity also brings a larger attack surface and thus it is important to understand it’s security aspects to be able to protect Docker containers.

One of the first steps in building secure Docker images is to write the Dockerfile with build instructions by following security best practices. This is the first stage of hardening your Docker containers. This course provides various tips and techniques with practical examples to produce secure docker builds.

This course is designed for students with any experience. If you never used Docker, its fine we have covered the basics and we will discuss how to instal Docker. If you have used Docker for containerizing your applications, thats even better. You know how to build docker images. So this course will build your skills on top of it.

It should be noted that this course is different from the other Docker Security course we published earlier. While the other courses focus completely on attacks and how to penetrate, this course’s primary focus is to show the defences and best practices to protect containers from security issues.

Who this course is for:

  • IT Professionals using Docker containers
  • IT Professionals planning to use Docker containers
  • IT Professionals using any orchestration tool such as Docker Swarm, Kubernetes
  • IT Professionals, who are looking to understand how to improve their Docker build security
  • Anyone who is interested in understanding Docker Security

What you’ll learn

  • Fundamentals of Docker Images and Containers
  • How to build your first docker image
  • How to run a docker container
  • Fundamentals of Docker build security
  • How Dockerfile can be written with security best practices
  • How to minimise the attack surface of Docker containers

HOMEPAGE – https://www.udemy.com/course/docker-security/

Download Links-

Note: Comment below if you find any link dead or getting problem in downloading files.

Categories: CoursesSecurity

0 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *