Overview
This course teaches how to secure the Docker host OS and set up audit rules for various Docker artifacts. The learning outcomes include understanding the best OS for hosting Docker, implementing minimal operating systems, utilizing the Linux audit framework, exploring auditing tools, and engaging in a practical demonstration. The course is intended for individuals interested in enhancing Docker security measures. The teaching method includes a video tutorial with practical demonstrations and recommended tools for Docker security.
Syllabus
Introduction.
What we will be covering.
Best OS for hosting Docker.
Minimal operating systems.
The Linux audit framework.
Auditing Tools.
Practical Demonstration.
Taught by
HackerSploit