Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Docker Security

Learn how to protect your containerized services.

GK# 5845

Course Overview

TOP

The Docker Security course is an advanced workshop style course designed to be inclusive of multiple roles: Developer, Operations, DevOps, or Architects. The course offers learners a hands-on overview of important security features and best practices to protect containerized services.  Completion of the Docker for Enterprise Operations course is strongly recommended as a pre-requisite.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP

By the end of the course successful learners will be able to:

  • List all the linux and network features imposed on containers by the Docker platform, and configure them where configurable.
  • Design and implement discretionary access control for users on the Docker EE platform.
  • Fully audit the provenance, contents and actions taken by containerized software from creation as an image, through testing and QA, and into deployment as a container in production.

Outline

TOP
Viewing outline for:

Virtual Classroom Live Outline

  1. Container security
    • kernel namespaces
    • root capabilities
    • secure computing mode
    • linux security modules
  2. Network security
    • Default and custom network encryption
    • Application isolation
  3. Role Based Access Control
    • Discretionary access model
    • LDAP integration
    • Multitenancy isolation
  4. Software Supply Chain
    • Known vulnerability audits
    • Identity signing
  5. Introspection
    • Log streaming
    • Metric tracking
    • Auditing the Docker platform

Labs

TOP
Viewing labs for:

Virtual Classroom Live Labs

The course features a variety of assessment instruments from practice quiz questions, lab exercises, to project based signature assignment for learners to practice and meet the learning objectives.

Prerequisites

TOP

Completion of the Docker for Enterprise Operations course is strongly recommended as a pre-requisite.

Who Should Attend

TOP

Developers, operators, system administrators, network administrators, and IT security professionals with a strong understanding of Docker technologies desiring a deep understanding of securing Docker environments at scale in an enterprise environment.

Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 1 day

Request this course in a different delivery format.
Enroll