• Online, Self-Paced
Course Description

Securing Docker depends mostly on your organization and its IT offerings to end users. To fully secure Docker, a multi-faceted approach should include Kernel Namespaces, Control Groups, Docker Daemon Attack Surface, Linux Kernel Capabilities, Docker Content Trust Signature Verification, Other Security Tools.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills required to:

  • Identify common Docker Engine vulnerabilities and automate software and application deployments.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.