• Online, Self-Paced
Course Description

Security planning is a critical part of configuring and hosting Docker images securely. This course will focus on ensuring the Docker images and environment are not vulnerable to unauthorized access and security attacks.

In this course, you'll learn how traditional software development models such as client server applications and REST-based web services are relevant to Docker. You'll examine the features, benefits, and challenges of using virtual machines versus Docker to deploy applications. Next, you'll explore some major Docker security concerns and methods for hardening Docker containers. You'll move on to learn about developing a security plan for Docker, specifically during the design phases of a project. Finally, you'll learn about Docker Seccomp and AppArmor profiles and why are they important.

Learning Objectives

{"discover the key concepts covered in this course"}

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.