Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Securing the Docker Host

HackerSploit via YouTube

Overview

This course teaches how to secure the Docker host OS and set up audit rules for various Docker artifacts. The learning outcomes include understanding the best OS for hosting Docker, implementing minimal operating systems, utilizing the Linux audit framework, exploring auditing tools, and engaging in a practical demonstration. The course is intended for individuals interested in enhancing Docker security measures. The teaching method includes a video tutorial with practical demonstrations and recommended tools for Docker security.

Syllabus

Introduction.
What we will be covering.
Best OS for hosting Docker.
Minimal operating systems.
The Linux audit framework.
Auditing Tools.
Practical Demonstration.

Taught by

HackerSploit

Reviews

Start your review of Securing the Docker Host

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.