We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Scenario Based Docker Security

A Cloud Guru

Welcome to this Scenario Based Docker Security course. This is the second course of a four-course learning path related to securing containers. The lessons that are presented here focus on the security aspect of Docker through which you will learn how to perform various configurations and navigate through different situations within the context of security. Having a proper configuration without security loopholes and having your software sources, such as container images, as secure as possible is very important. In the first part of this course, we will begin with a guide on how to install and configure Docker properly. We will talk about resource restrictions where you will learn about Linux cgroups and how they can be used to pose limits on different aspects of your system, as well as learn how to monitor resources and process usage. After that, we will move on to Seccomp - Secure Computing Mode and learn how to configure seccomp profiles. Seccomp is a security tool mechanism that Docker can use to achieve additional security. Securing software sources is extremely important, which is why we will go over the whole process of creating a repository, creating an image, pushing it to the repository, pulling it, doing some changes, pushing it back and so forth, while keeping in mind how to achieve optimal security. This is why we will talk about topics such as creating SSL certificates so that the traffic between us and the software source is encrypted. This will be achieved using Certbot and Let’s Encrypt. We will talk about the security advantages of private repositories and custom images. You will learn how to create custom images from scratch, specifically two images, where one will be a web server image and the other a MySql Database image. After that, we will take a closer look at Docker Bench. It is a security tool that is also used for optimization. When it runs, it performs a series of scans that give you suggestions on what should or shouldn't be fixed. When all of this is done, the last part of this course is dedicated to deploying and securing an application's backend. These videos can be viewed as a sort of mini-project and review of what has been learned so far. We will be configuring a Docker container to run an Apache web server as an application backend. We will configure a Docker container for which we need to create a custom image to run a Python application (more specifically a Flask application). This application will have an active API that is fully functional and it will achieve a connection to a database for which we will also need to construct a container. So, we will have two Docker containers communicating with each other. We will also set up an Apache web server that will be a gateway to the outer world, so to speak. It will be used as a reverse proxy to allow connections from the outer world to reach our containers. Certbot will be utilized for creating an SSL certificate for our domain.

Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Focuses on securing containers, which is a highly relevant industry topic
Taught by A Cloud Guru, who are recognized for their work in cloud computing
Provides a comprehensive study of Docker security, covering various aspects and tools
Includes hands-on labs and interactive materials, enhancing the learning experience
Requires prior knowledge of Docker and related concepts
Assumes familiarity with Linux cgroups and network security concepts

Save this course

Save Scenario Based Docker Security to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Scenario Based Docker Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Scenario Based Docker Security will develop knowledge and skills that may be useful to these careers:
DevOps Engineer
A DevOps Engineer is a software development professional who specializes in the management of software development and operations processes. This role is responsible for the planning, design, implementation, and maintenance of software systems. A DevOps Engineer may also be responsible for the deployment and management of cloud-based applications.
Cloud Engineer
A Cloud Engineer is responsible for the design, implementation, and management of cloud-based applications and systems. This role may also be involved in the development of cloud-based solutions and the migration of legacy systems to the cloud.
Site Reliability Engineer
A Site Reliability Engineer (SRE) is responsible for the reliability and performance of software systems. This role may be involved in the design, implementation, and maintenance of software systems, as well as the development of tools and processes to improve the reliability and performance of these systems.
Security Engineer
A Security Engineer is responsible for the security of software systems. This role may be involved in the design, implementation, and maintenance of security systems, as well as the development of tools and processes to improve the security of these systems.
Software Developer
A Software Developer is responsible for the design, development, and maintenance of software applications. This role may be involved in the full software development lifecycle, from the requirements gathering and analysis phase to the testing and deployment phase.
Systems Administrator
A Systems Administrator is responsible for the maintenance and management of computer systems. This role may be involved in the installation, configuration, and maintenance of hardware and software, as well as the monitoring and troubleshooting of system problems.
Network Engineer
A Network Engineer is responsible for the design, implementation, and maintenance of computer networks. This role may be involved in the installation, configuration, and maintenance of network hardware and software, as well as the monitoring and troubleshooting of network problems.
Database Administrator
A Database Administrator is responsible for the maintenance and management of databases. This role may be involved in the installation, configuration, and maintenance of database software, as well as the monitoring and troubleshooting of database problems.
Information Security Analyst
An Information Security Analyst is responsible for the security of information systems. This role may be involved in the design, implementation, and maintenance of information security systems, as well as the development of tools and processes to improve the security of these systems.
Software Tester
A Software Tester is responsible for the testing of software applications. This role may be involved in the design, implementation, and execution of test cases, as well as the analysis and reporting of test results.
Business Analyst
A Business Analyst is responsible for the analysis and understanding of business requirements. This role may be involved in the gathering, analysis, and documentation of business requirements, as well as the development of solutions to meet these requirements.
Project Manager
A Project Manager is responsible for the planning, execution, and control of projects. This role may be involved in the development of project plans, the allocation of resources, and the monitoring and tracking of project progress.
Technical Writer
A Technical Writer is responsible for the creation and maintenance of technical documentation. This role may be involved in the writing, editing, and proofreading of technical documents, as well as the development of technical content.
IT Auditor
An IT Auditor is responsible for the auditing of information systems. This role may be involved in the assessment of the security, reliability, and efficiency of information systems, as well as the development of recommendations for improvements.
IT Consultant
An IT Consultant is responsible for the provision of advice and guidance on information technology. This role may be involved in the assessment of IT needs, the development of IT solutions, and the implementation of IT systems.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Scenario Based Docker Security.
Provides a comprehensive overview of Docker, covering everything from installation and configuration to security and troubleshooting. It valuable resource for anyone who wants to learn more about Docker and how to use it effectively.
Practical guide to Docker security. It covers a wide range of topics, including image scanning, vulnerability management, and network security. It valuable resource for anyone who wants to learn more about how to secure Docker containers.
Practical guide to securing Docker containers. It covers a wide range of topics, including image scanning, vulnerability management, and network security. It valuable resource for anyone who wants to learn more about how to secure Docker containers.
Practical guide to using Docker. It covers a wide range of topics, including building and deploying Docker images, managing Docker containers, and troubleshooting Docker issues. It valuable resource for anyone who wants to learn more about how to use Docker in practice.
Practical guide to using Docker in a variety of real-world scenarios. It covers topics such as building and deploying Docker images, managing Docker containers, and troubleshooting Docker issues. It valuable resource for anyone who wants to learn more about how to use Docker in practice.
Comprehensive guide to Docker. It covers everything from the basics of Docker to advanced topics such as building and deploying Docker images. It valuable resource for anyone who wants to learn more about Docker.
Comprehensive guide to Jenkins. It covers everything from the basics of Jenkins to advanced topics such as creating and managing Jenkins pipelines. It valuable resource for anyone who wants to learn more about Jenkins.
Comprehensive guide to using Ansible in a variety of DevOps scenarios. It covers topics such as deploying applications, managing infrastructure, and automating tasks.
Comprehensive guide to Terraform. It covers everything from the basics of Terraform to advanced topics such as creating and managing Terraform modules.
Comprehensive guide to cloud native DevOps with Kubernetes. It covers everything from the basics of Kubernetes to advanced topics such as creating and managing Kubernetes clusters.
Practical guide to using Istio in a variety of real-world scenarios. It covers topics such as deploying Istio, managing Istio traffic, and troubleshooting Istio issues. It valuable resource for anyone who wants to learn more about how to use Istio in practice.
Comprehensive guide to Kubernetes. It covers everything from the basics of Kubernetes to advanced topics such as cluster management and security. It valuable resource for anyone who wants to learn more about Kubernetes.
Comprehensive guide to Helm. It covers everything from the basics of Helm to advanced topics such as creating and managing Helm charts. It valuable resource for anyone who wants to learn more about Helm.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser