Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:


Docker Security

Learn how to protect your containerized services.

GK# 5845

Course Overview


The Docker Security course is an advanced workshop style course designed to be inclusive of multiple roles: Developer, Operations, DevOps, or Architects. The course offers learners a hands-on overview of important security features and best practices to protect containerized services.  Completion of the Docker for Enterprise Operations course is strongly recommended as a pre-requisite.


  • Delivery Format:
  • Date:
  • Location:
  • Access Period:


What You'll Learn


By the end of the course successful learners will be able to:

  • List all the linux and network features imposed on containers by the Docker platform, and configure them where configurable.
  • Design and implement discretionary access control for users on the Docker EE platform.
  • Fully audit the provenance, contents and actions taken by containerized software from creation as an image, through testing and QA, and into deployment as a container in production.


Viewing outline for:

Virtual Classroom Live Outline

  1. Container security
    • kernel namespaces
    • root capabilities
    • secure computing mode
    • linux security modules
  2. Network security
    • Default and custom network encryption
    • Application isolation
  3. Role Based Access Control
    • Discretionary access model
    • LDAP integration
    • Multitenancy isolation
  4. Software Supply Chain
    • Known vulnerability audits
    • Identity signing
  5. Introspection
    • Log streaming
    • Metric tracking
    • Auditing the Docker platform


Viewing labs for:

Virtual Classroom Live Labs

The course features a variety of assessment instruments from practice quiz questions, lab exercises, to project based signature assignment for learners to practice and meet the learning objectives.



Completion of the Docker for Enterprise Operations course is strongly recommended as a pre-requisite.

Who Should Attend


Developers, operators, system administrators, network administrators, and IT security professionals with a strong understanding of Docker technologies desiring a deep understanding of securing Docker environments at scale in an enterprise environment.

Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 1 day

Request this course in a different delivery format.