The Ultimate Container Security Workshop Track
Hands on Labs
Title | Link |
---|---|
1.What is container? | lab |
2.Container vs. Virtualization | lab |
3.Container Advantage and Disadvantages | lab |
4.Namespaces | lab |
5.Cgroups | |
6.Capabilities | lab |
7.Docker architecture and its components | lab |
8.Interacting with container ecosystem | lab |
9.Attack surface of the container ecosystem | lab |
10.Environment variables | lab |
11.Docker volumes | lab |
12.Docker Networking | lab |
13.Auditing Docker Security | lab |
14.Container Image Security | lab |
15.DockerFile Security Best Practices | lab |
16.SecretScanner - Finding secrets and passwords in container images and file systems | lab |
17.YaraHunter - Malware Scanner for Container Images | lab |
18.Security Linting of Dockerfiles | lab |
19.Static Analysis of container images/library for container | lab |
20.Docker host security configurations | lab |
21.Docker Daemon security configurations | lab |
22.Content Trust and Integrity checks | lab |
23.Docker Registry security configurations | lab |
24. DockerScan | lab |
25.Dive | lab |
26.Scanning Docker for vulnerabilities with ThraetMappeper | lab |
27.Docker events | lab |
28.Sock Shop Docker Compose & Weave | lab |
What next