Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Docker Security

Learn how to protect your containerized services.

GK# 5845

Course Overview

TOP

In this course, you will learn about important security features and best practices to protect your containerized services. Designed to be inclusive of multiple roles, this course is appropriate for all team members who are hands-on with Docker, including developers, operations personnel, DevOps, and architects. Completion of the Docker for Enterprise Operations  course is strongly recommended prior to attending.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • List all the Linux and network features imposed on containers by the Docker platform and configure them where configurable.
  • Design and implement discretionary access control for users on the Docker EE platform.
  • Fully audit the provenance, contents and actions taken by containerized software from creation as an image, through testing and QA, and into deployment as a container in production.

Outline

TOP
Viewing outline for:

Virtual Classroom Live Outline

  • Container security
    • kernel namespaces
    • root capabilities
    • secure computing mode
    • Linux security modules
  • Network security
    • Default and custom network encryption
    • Application isolation
  • Role Based Access Control
    • Discretionary access model
    • LDAP integration
    • Multitenancy isolation
  • Software Supply Chain
    • Known vulnerability audits
    • Identity signing
  • Introspection
    • Log streaming
    • Metric tracking
    • Auditing the Docker platform

Labs

TOP
Viewing labs for:

Virtual Classroom Live Labs

The course features a variety of assessment instruments from practice quiz questions, lab exercises, to project based signature assignment for learners to practice and meet the learning objectives.

Prerequisites

TOP

Completion of the Docker for Enterprise Operations course is strongly recommended as a pre-requisite.

Who Should Attend

TOP

Developers, operators, system administrators, network administrators, and IT security professionals with a strong understanding of Docker technologies desiring a deep understanding of securing Docker environments at scale in an enterprise environment.

Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 1 day

Request this course in a different delivery format.
Enroll