2163670 a919 3
Size: 1.26 GB


This course introduces students to the security concepts associated with Docker. Docker is a popular software and it is widely used in Information Technology Industry. It’s popularity also brings a larger attack surface and thus it is important to understand it’s security aspects to be able to protect Docker containers. This course is designed for students with any experience. If you never used Docker, its fine we have covered the basics. If you have used Docker for containerizing your applications, we have covered some advanced topics such as escaping from containers to host using misconfigured containers. Regardless of your experience with Docker, we have got you covered here.

Who this course is for:

  • IT Professionals using Docker containers
  • IT Professionals planning to use Docker containers
  • IT Professionals using any orchestration tool such as Docker Swarm, Kubernetes
  • Anyone who is interested in understanding Docker Security

What you’ll learn

  • Fundamentals of Docker Images and Containers
  • How to build your first docker image
  • How to run your first docker container
  • Fundamentals of Container Security
  • Auditing docker containers using automated tools
  • Docker security fundamentals for Penetration Testers
  • Common container misconfigurations
  • Container security concepts that can be applied in DevSecOps pipelines
  • This course falls into the categories – Cyber Security, Ethical Hacking, Information Security

HOMEPAGE – https://www.udemy.com/course/hacking-and-securing-docker-containers/

Zippyshare Links-

Note: Comment below if you find any link dead or getting problem in downloading files.

You May Also Like

eLearnSecurity – Incident Handling & Response Professional
pwk2 announce post 2 1 1024x536 1
Penetration Testing With Kali Linux (PWK) 2020
2506082 01cc 3
Internet Security: A Hands-on Approach


ahmed · March 4, 2021 at 5:11 pm

links are dead.

Leave a Reply

Your email address will not be published.