• Online, Self-Paced
Course Description

Securing Docker depends mostly on your organization and its IT offerings to end users. To fully secure Docker, a multi-faceted approach should include Kernel Namespaces, Control Groups, Docker Daemon Attack Surface, Linux Kernel Capabilities, Docker Content Trust Signature Verification, Other Security Tools.

Learning Objectives


On successful completion of this course, learners should have the knowledge and skills required to:

  • Identify common Docker Engine vulnerabilities and automate software and application deployments.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):