We may earn an affiliate commission when you visit our partners.
CodeMash

CodeMash 2020 | What's in Your Docker? Open Source Security Vulnerabilities in Containers | Matt Williams

Read more

CodeMash 2020 | What's in Your Docker? Open Source Security Vulnerabilities in Containers | Matt Williams

You stay on top of operating system vulnerabilities and patch regularly. Did you ever consider that there may be vulnerabilities in your containers? Not all vulnerabilities are created equal. In this talk, Matt Williams investigates methods for detecting and mitigating vulnerabilities in containers.

Enroll now

What's inside

Syllabus

What's in Your Docker? Open Source Security Vulnerabilities in Containers

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Suitable for learners interested in software, computer science, and computer safety
In this course, you'll analyze methods for detecting and mitigating vulnerabilities in containers
Taught by Matt Williams, who is a recognized lead and speaker in software and computer science

Save this course

Save Open Source Security Vulnerabilities in Containers: CodeMash to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Open Source Security Vulnerabilities in Containers: CodeMash. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Open Source Security Vulnerabilities in Containers: CodeMash will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and systems. They also monitor and analyze security systems to detect and respond to security breaches. This course may be useful to Information Security Analysts who want to learn more about the security risks associated with containers. The course will provide information on how to detect and mitigate these risks, which can help Information Security Analysts to better protect their organizations from cyber attacks.
Cloud Architect
Cloud Architects design, build, and maintain cloud computing systems. They also troubleshoot and resolve cloud computing issues. This course may be useful to Cloud Architects who want to learn more about the security risks associated with containers. The course will provide information on how to detect and mitigate these risks, which can help Cloud Architects to design and build more secure cloud computing systems.
Computer Network Architect
Computer Network Architects design, build, and maintain computer networks. They also troubleshoot and resolve network issues. This course may be useful to Computer Network Architects who want to learn more about the security risks associated with containers. The course will provide information on how to detect and mitigate these risks, which can help Computer Network Architects to design and build more secure networks.
Security Engineer
Security Engineers design, implement, and maintain security systems. They also investigate and respond to security breaches. This course may be useful to Security Engineers who want to learn more about the security risks associated with containers. The course will provide information on how to detect and mitigate these risks, which can help Security Engineers to better protect their organizations from cyber attacks.
Software Engineer
Software Engineers design, develop, and maintain software applications. They also troubleshoot and resolve software issues. This course may be useful to Software Engineers who want to learn more about the security risks associated with containers. The course will provide information on how to detect and mitigate these risks, which can help Software Engineers to develop more secure software applications.
DevOps Engineer
DevOps Engineers work to bridge the gap between development and operations teams. They help to ensure that software is developed and deployed quickly and efficiently. This course may be useful to DevOps Engineers who want to learn more about the security risks associated with containers. The course will provide information on how to detect and mitigate these risks, which can help DevOps Engineers to build and deploy more secure software.
Cybersecurity Analyst
Cybersecurity Analysts monitor and analyze computer networks and systems for security threats. They also investigate and respond to security breaches. This course may be useful to Cybersecurity Analysts who want to learn more about the security risks associated with containers. The course will provide information on how to detect and mitigate these risks, which can help Cybersecurity Analysts to better protect their organizations from cyber attacks.
System Administrator
System Administrators manage and maintain computer systems. They also troubleshoot and resolve system issues. This course may be useful to System Administrators who want to learn more about the security risks associated with containers. The course will provide information on how to detect and mitigate these risks, which can help System Administrators to better protect their systems.
Network Administrator
Network Administrators manage and maintain computer networks. They also troubleshoot and resolve network issues. This course may be useful to Network Administrators who want to learn more about the security risks associated with containers. The course will provide information on how to detect and mitigate these risks, which can help Network Administrators to better protect their networks.
Database Administrator
Database Administrators manage and maintain databases. They also troubleshoot and resolve database issues. This course may be useful to Database Administrators who want to learn more about the security risks associated with containers. The course will provide information on how to detect and mitigate these risks, which can help Database Administrators to better protect their databases.
Data Analyst
Data Analysts analyze data to identify trends and patterns. They also develop and implement data-driven solutions to business problems. This course may be useful to Data Analysts who want to learn more about the security risks associated with containers. The course will provide information on how to detect and mitigate these risks, which can help Data Analysts to better protect their data.
IT Manager
IT Managers plan and direct the activities of an organization's IT department. They also develop and implement IT policies and procedures. This course may be useful to IT Managers who want to learn more about the security risks associated with containers. The course will provide information on how to detect and mitigate these risks, which can help IT Managers to better protect their organizations from cyber attacks.
Product Manager
Product Managers develop and manage products. They also work with marketing and sales teams to bring products to market. This course may be useful to Product Managers who are working on products that involve containers. The course will provide information on how to identify and mitigate the security risks associated with containers, which can help Product Managers to develop and deliver more secure products.
Business Analyst
Business Analysts analyze business processes and develop solutions to improve efficiency and effectiveness. This course may be useful to Business Analysts who are working on projects that involve containers. The course will provide information on how to identify and mitigate the security risks associated with containers, which can help Business Analysts to develop better solutions for their clients.
Project Manager
Project Managers plan, execute, and close projects. They also manage project teams and resources. This course may be useful to Project Managers who are working on projects that involve containers. The course will provide information on how to identify and mitigate the security risks associated with containers, which can help Project Managers to deliver successful projects.

Reading list

We haven't picked any books for this reading list yet.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser