5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Operating Systems and Servers     DevOps     Advanced Docker Security Considerations
Security planning is a critical part of configuring and hosting Docker images securely. This course will focus on ensuring the Docker images and environment are not vulnerable to unauthorized access and security attacks.
In this course, you'll learn how traditional software development models such as client server applications and REST-based web services are relevant to Docker. You'll examine the features, benefits, and challenges of using virtual machines versus Docker to deploy applications. Next, you'll explore some major Docker security concerns and methods for hardening Docker containers. You'll move on to learn about developing a security plan for Docker, specifically during the design phases of a project. Finally, you'll learn about Docker Seccomp and AppArmor profiles and why are they important.

Objectives

Docker Skills: Advanced Docker Security

  • discover the key concepts covered in this course
  • describe some of the traditional software development models such as client server applications and REST-based web services, as well as how much of each model still applies to Docker
  • compare the features, benefits, and challenges of using virtual machines versus Docker to deploy applications
  • describe some major Docker security concerns and methods for hardening Docker containers
  • describe aspects of Docker security planning, specifically during the design phases of a project, such as daemons, kernel namespaces, control groups, trust signatures, and underlying infrastructure dependencies
  • describe the purpose of Docker content trust and how to digitally sign images
  • describe the purpose of the Docker daemon and methods for ensuring it is secure
  • describe the purpose of the Docker kernel namespaces and methods for ensuring they are secure
  • describe Docker Seccomp profiles and why are they important
  • describe AppArmor profiles and why are they important
  • configure Seccomp security profiles for Docker
  • configure AppArmor security profiles for Docker
  • summarize the key concepts covered in this course