Securing Docker

Many of us out there are likely using Docker. Containerisation has burst onto the scene and is taking the infrastructure and development worlds by storm. And why not? After all, it helps resolve a load of traditional deployment woes and goes hand in hand with cloud computing and spinning up new instances faster and more reliably.

But how many of us can say that we’re using Docker securely?

This week on Pluralsight, Securing the Docker Platform by Nigel Brown is free.

In this course, you’ll learn about the fundamental aspects of security that apply to this distribution vehicle for cloud native application services.

The course itself has four hours of amazing content free until next Tuesday evening – head over to Pluralsight and check it out!

From The Author

Docker containers are in widespread use as the distribution vehicle for cloud native application services. An important enabler in the process of building, packaging, and running those containers is the Docker platform, which is comprised of several parts. In this course, Securing the Docker Platform, you’ll learn about the fundamental aspects of security that relate to the platform components. First, you’ll gain a better understanding of the platform components involved and the means of measuring compliance against an industry benchmark standard. Next, you’ll discover how to configure the Docker daemon for best practice security, as well as for more flexible access control and authentication. Finally, you’ll explore how to apply security controls to other aspects of the platform including a self-hosted Docker registry and a Swarm cluster. By the end of this course, you’ll have the necessary knowledge to configure, measure, and optimize effective Docker platform security.

Nigel Brown

You may also like...

0 0 votes
Article Rating
Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x