Completed
Securing containers
Class Central Classrooms beta
YouTube playlists curated by Class Central.
Classroom Contents
Securing Cloud Applications and Their Credentials
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Why should we care
- 3 Containerization
- 4 Security
- 5 There is no perfect system
- 6 What do you want vs what do you need
- 7 Layers
- 8 Containers
- 9 Additional security features
- 10 Container security
- 11 Common problems
- 12 Modern apps
- 13 Exfiltration potential
- 14 Dont trust developers
- 15 Developers vs security
- 16 Credentials
- 17 Securing containers
- 18 Managing credentials
- 19 Secret Lists
- 20 Conclusion