Docker Security Course

Containers are gaining popularity and prominence in IT. This course provides methods to use Docker securely.

4 hours, 46 minutes

Course description

Learn Docker and containers from Linux kernel primitives that are fundamental for deploying and maintaining a container-based infrastructure. This course covers building secure container images, running containers securely, networking containers and how to manage vulnerabilities in containers across your infrastructure. Dive into Docker with security and confidence.

Syllabus

Baselines and Anomaly Detection

Video - 00:16:00

Live Scanning

Video - 00:11:00

Immutable Containers

Video - 00:18:00

Iron vs VM vs Cloud Providers

Video - 00:20:00

Hardening the Build Infrastructure

Video - 00:14:00

Public vs Internal Image Repositories

Video - 00:12:00

Reproducible Builds

Video - 00:16:00

Outside the Container

Video - 00:24:00

Inside the Container

Video - 00:23:00

Docker Networking

Video - 00:15:00

Seccomp & Capabilities

Video - 00:20:00

Namespaces & Cgroups

Video - 00:16:00

Dockerfile Best Practices

Video - 00:36:00

Running Dockers and Persisting Data

Video - 00:27:00

Container Image Misconfigurations

Video - 00:20:00

Meet the author

Matt Tesauro

Matt Tesauro specializes in using containers for continuous security at AppSec Pipelines and is a founder of 10Security. Prior work includes Senior AppSec Engineer roles at Duo Security, Pearson and Rackspace. Matt has 20+ years of specializing in application and cloud security. He is a project leader for OWASP AppSec Pipeline & DefectDojo projects.

The AppSec Pipeline project brings DevOps lessons to AppSec while DefectDojo is an application that normalizes output from 70+ different security tools. He holds two degrees from Texas A&M University and several security and Linux certifications.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All-Source Analyst
  • Mission Assessment Specialist
  • Threat / Warning Analyst

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust