Course Learning Objectives
This course is part of the line of defending against threats to the cloud. Defending Docker builds on the foundations of cloud security but in the context of the Docker platform. Defending Docker is comprised of five modules that cover implementing best practices for kernel security, securing the Docker daemon, managing unverified Docker images, securing network communication and traffic, and configuring authentication and authorization in the Docker Trusted Registry (DTR) and Docker Universal Control Plane (UCP).
Defending Docker was created for DevOps and Ops Engineers who have experience using Docker and familiarity with application security. This course focuses on configuring the Docker platform to defend against the most common security threats.
Tailored learning – 40 minutes total
DOC201S - Defending Docker