Securely managing Docker images

Securely managing Docker images смотреть последние обновления за сегодня на .

Best practices for building secure Docker images

29448
545
16
00:08:23
04.02.2016

Application security is very important, and starts with the basic building blocs of your application. In the first video in his new series, Docker's Security Lead Diogo Monica reviews his basic tips for constructing secure Docker images. For more information, check out 🤍 Docker is an open platform for developers and system administrators to build, ship and run distributed applications. With Docker, IT organizations shrink application delivery from months to minutes, frictionlessly move workloads between data centers and the cloud and can achieve up to 20X greater efficiency in their use of computing resources. Inspired by an active community and by transparent, open source innovation, Docker containers have been downloaded more than 700 million times and Docker is used by millions of developers across thousands of the world’s most innovative organizations, including eBay, Baidu, the BBC, Goldman Sachs, Groupon, ING, Yelp, and Spotify. Docker’s rapid adoption has catalyzed an active ecosystem, resulting in more than 180,000 “Dockerized” applications, over 40 Docker-related startups and integration partnerships with AWS, Cloud Foundry, Google, IBM, Microsoft, OpenStack, Rackspace, Red Hat and VMware.

Finding leaked credentials in Docker images - How to secure your Docker images

3680
92
4
00:16:58
26.11.2021

Docker can be a blind spot for security, in this video we look at leaked credentials inside docker images. We evaluate how leaked secrets like API keys and certificats are leaked into docker images, how we can detect them and how we can protect our own images. Resources: Research into leaked credentials in docker images: 🤍 Dive, tool to view docker images: 🤍 GG-Shield, tool to scan docker images: 🤍 GitGuardian, Secrets detection solution: 🤍 Cheatsheet, protecting docker images: 🤍 Intro: 0:00 What are secrets: 0:49 What is docker: 2:10 Inside docker images: 3:24 Examples of leaked secrets: 5:19 How secrets leak in docker images: 7:08 Docker security research: 10:00 Scanning Docker for secrets: 11:40 Wrap-up: 16:41

How to secure your Docker containers! (5 practical tips with example Dockerfiles! 🐳)

21318
689
46
00:05:52
17.08.2020

While Docker containers provide many great security features out of the box, there are still many important considerations to ensure your application and data are protected. In this video, I share five techniques that can help make your production containers more secure! Cheers! - Join the Community: 💬 Discord: 🤍 💻 GitHub: 🤍 🐥 Twitter: 🤍 👨‍💼 LinkedIn: 🤍 🌐 Website: 🤍 - Timestamps: 0:00 - Intro 0:34 - Example webserver code 0:48 - Naive Dockerfile 1:00 - Tip #1: Don't run the container as the root user 1:37 - Tip #2: Use a multi-stage build + distroless base image 2:54 - Tip #3: Harden the security of the host system 3:43 - Tip #4: Use a container image scanner to detect vulnerabilities 4:47 - Tip #5: Don't install/configure things within the Dockerfile without understanding the potential risks 5:15 - Closing thoughts - Community Size at Time of Posting: - Subscribers: 367 - Channel Views: 5523 Note: I have a running joke with my wife that I'm not going to shave my beard until I reach 1000 subscribers (the last time I did was at 100...) and it is starting to get out of control 🧔+🎅+😳

Docker Security Essentials | How To Secure Docker Containers

33888
836
63
00:53:32
29.03.2021

In this video, we will take a look at how to secure Docker containers and some of the security best practices to implement when running Docker containers. Docker is a set of platforms as service products that use OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries and configuration files; they can communicate with each other through well-defined channels. Video Documentation: 🤍 - REGISTER FOR PART 2: 🤍 GET $100 IN LINODE CREDIT: 🤍 - BLOG ►► 🤍 FORUM ►► 🤍 ACADEMY ►► 🤍 - TWITTER ►► 🤍 INSTAGRAM ►► 🤍 LINKEDIN ►► 🤍 PATREON ►► 🤍 MERCHANDISE ►► 🤍 - CYBERTALK PODCAST ►► 🤍 - We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms. - Thanks for watching! Благодарю за просмотр! Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé Obrigado por assistir دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة - #Infosec#Docker

Docker #1 - Managing images & containers (in 12 minutes)

625
12
2
00:11:30
06.02.2022

In this first video about Docker, we'll cover how to pull images from Docker hub, run containers from them, change them and make images out of containers. #docker #terminal Timestamp: 0:00 Intro 0:18 Docker intro 00:36 Download Docker Desktop for Windows, Mac or Linux 00:43 Docker cloud playground CLI 1:18 Docker pricing 1:25 Why I'm using Docker? 1:44 Two terminal setup for Docker 2:03 Docker hub images 2:29 Docker pull images (alpine) 2:43 Docker error, restart 2:58 Docker images 3:17 Docker files, images & containers 3:32 Docker run image 4:20 Inside Docker image/container 4:42 Docker containers 4:56 Docker ps 5:31 Exit container 5:54 Docker ps -a 6:26 Docker ps -l 6:35 Docker difference between containers 7:00 Run a Docker container 7:10 Start Docker container 7:25 Docker exec 7:40 Alpine APK package manager 8:15 Add user to Alpine container with sudo/wheel permission & change password 8:36 Create image from container 8:46 Docker commit 9:36 Run new Docker image 9:46 Docker remove container 10:02 Docker remove image 10:16 Docker prune container/image 10:36 Docker system prune, remove all 10:49 Start with different user or home directory with alias Used links: Download Docker: 🤍 Docker hub: 🤍 Docker cloud play: 🤍 Docker pricing: 🤍 Used commands: alt+shift+D for second terminal pane in Windows Terminal docker pull alpine docker pull ubuntu docker images docker run -it alpine sh docker run -it ubuntu bash docker ps docker ps -a docker ps -l docker start containerID docker stop containerID docker exec -it containerID sh docker commit containerID newName docker rm containerID docker rmi imageName docker container prune docker image prune -a docker system prune -a docker start containerID; docker exec -it user itvraag -w /home/itvraag containerID bash apk update apk upgrade apk add bash vim adduser itvraag addgroup itvraag wheel passwd

Managing Docker Images with the JFrog Platform

3077
21
1
00:58:24
01.03.2021

Managing Docker images from development to production is a challenge for many companies looking to scale. More details on JFrog & Docker combined: 🤍 Images full of packages containing layers of different file types creates a needle in a haystack situation when hunting down security vulnerabilities or dependency issues. On top of worrying about what versions of what images are ready for release, in order to create a streamlined delivery process for Docker images, you also need to incorporate security into your pipeline. In this webinar, we will cover some important topics on why your teams should use Artifactory as your Docker Registry and the many benefits and advantages that come along with it.

Top 8 Docker Best Practices for using Docker in Production

205416
7954
212
00:18:27
11.11.2021

8 Docker Production Best Practices to improve security, reduce the image size and improve build time Full Docker course ► 🤍 Follow me on IG for behind-the-scenes content 😊 ► 🤍 ► This video is sponsored by Kasten 🙌🏼 ► Free Kubernetes Backup and Migration - Download Kasten's K10 and Get 10 nodes free forever: 🤍 Docker adoption rises constantly, but not everyone is using Docker according to the best practices. So in this video I want to show you 8 ways you can use docker in a right way in your projects to improve security, optimize the image size and take advantage of some of the useful Docker features and also write cleaner and more maintainable Dockerfiles. ▬▬▬▬▬▬ T I M E S T A M P S ⏰ ▬▬▬▬▬▬ 0:00 - Intro 0:34 - BP 1: Use official and verified Docker Images as Base Image 1:13 - BP 2: Use Specific Docker Image Versions 2:12 - BP 3: Use Small-Sized Official Images 4:35 - BP 4: Optimize Caching Image Layers 10:09- BP 5: Use .dockerignore file 10:55 - BP 6: Make use of Multi-Stage Builds 14:15 - BP 7: Use the Least Privileged User 16:06 - BP 8: Scan your Images for Security Vulnerabilities 17:50 - Wrap Up ▬▬▬▬▬▬ Want to learn more? 🚀 ▬▬▬▬▬▬ Full Docker course ► 🤍 Full Python course ► 🤍 Full K8s course course ► 🤍 DevOps Tools, like Terraform, Prometheus ► 🤍 ▬▬▬▬▬▬ Connect with me 👋 ▬▬▬▬▬▬ INSTAGRAM ► 🤍 TWITTER ► 🤍 LINKEDIN ► 🤍 FB group ► 🤍 DEV ► 🤍 ▬▬▬▬▬▬ Courses & Bootcamp & Ebooks 🚀 ▬▬▬▬▬▬ ► Become a DevOps Engineer - full educational program 👉🏼 🤍 ► High-Quality and Hands-On Courses 👉🏼 🤍 ► Kubernetes 101 - compact and easy-to-read ebook bundle 👉🏼 🤍

Container Security Explained

34369
827
23
00:06:51
30.10.2020

Learn more about Containers: 🤍 Learn more about Cloud Security: 🤍 Check out IBM Cloud Kubernetes Service: 🤍 Check out IBM Cloud Security Solutions: 🤍 ► Earn a badge with FREE interactive Kubernetes labs: 🤍 Containers have become one of the most important technologies for modern IT infrastructure as they enable you to better manage your applications in a way that is portable, reusable, and automatable. This can help you reduce the amount resources needed to manage application infrastructure, but also introduces some new security risks. In this lightboard video, Charles Neblett with IBM Cloud, covers a number of security vulnerabilities that may exist around the environment of your containers, as well as some good open source tools that you can use to help keep your containers secure. Get started on IBM Cloud at no cost: 🤍 Subscribe to see more videos like this in the future → 🤍 #Containers #ContainerSecurity #CloudSecurity

Haining Henry Zhang - Efficient and Secure Container Image Management by using Harbor

1754
15
0
00:25:20
30.08.2017

*About vBrownBag* SUBSCRIBE! 🤍 Socials: Twitter: 🤍 Facebook: 🤍 iTunes: 🤍 Google+: google.com/+vBrownBag 🤍 is a community of people who believe in helping other people. Specifically we work in IT infrastructure and we help other people in the IT industry to better their carreers by educating. Most frequent activity is producing the vBrownBag podcast. vBrownBag also attends global conferences to produce TechTalks and theater sessions. *About vBrownBag Podcasts* The vBrownBag crew host podcasts where community members present on topics that will help others in the community. Some podcast series are aimed at helping people achieve certifications. Other podcasts help community members learn an entirely new subject area. We also cover areas like storage or automation. The podcast has been running weekly since 2010. *vBrownBag TechTalks* The vBrownBag crew love IT conferences, the only place where we actually see each other, the awesome people who are our presenters and the community members who follow the podcast. The conferences are also a great place to generate some more community learning content. More about vBrownBag: 🤍

How to Manage Docker Images | Understanding multiple layers of Docker Image

811
13
0
00:13:55
29.03.2020

Agenda: What is Docker Image? Understanding the multiple layers of Docker Image How to search a Docker Image? How to pull and run a Docker Image? How to fetch the history of Docker Image? How to remove a Docker Image? * What is Docker Image? Docker Image is a file that contains the code and components to run your application in the Docker container. How do you Manage a Docker Image? docker search nginx docker pull nginx docker run nginx docker image history nginx docker image rm nginx * As a prerequisite you need to have docker installed. Docker Introduction: 🤍 Docker installation from Scratch: 🤍

Docker Container Security

13260
95
2
00:36:21
10.01.2019

Creating a Secure Supply Chain for your applications is vitally important for a compliant and smooth-running application development organization. Every organization needs to understand where their container images come from, who has access to them, understand the security risks to weigh ALL options available before deploying . In this session, we will take a closer look at how Docker Enterprise helps developers, DevOps and DevSecOps teams securely Build and Ship applications through the software pipeline. We’ll dive into security features of the platform’s private registry Image Signing which provides authenticity for image sources and Image Scanning which provides insight into any vulnerabilities. We’ll also look at how this can be automated by policy and seamlessly integrated with your software pipeline to provide a succinct audit trail.

Alpine Linux Docker Images, are they really more secure?

11067
149
18
00:20:25
09.02.2019

There's a lot more to consider with a base image then just minimalism and size. The default base for Docker Hub official images is Debian, but Alpine is also a popular option and is created as an alternative for all official images. However, Alpine isn't always "better" in all cases. Show Notes: - Alpine Linux 🤍 - CVE Database 🤍 - Blog on CVE Scanners and their effectiveness on Alpine images 🤍 Join me weekly for my YouTube Live DevOps and Docker Q&A by subscribing to this channel and clicking the bell icon to get alerts when I go live. You can also check out my Docker courses and free resources at 🤍 Signup for my newsletter to get short emails when I launch new things (videos, podcasts, open source, etc.) 🤍

you’ve been using Docker WRONG!!

90326
4400
443
00:12:19
23.09.2022

Start using Docker the RIGHT WAY with Linode: 🤍 Sign up using my link and you will get a 100$ credit that is valid for 60 days STOP using Docker the hard way! Make your life more delightful by using Portainer. This is going to be your best friend when it comes to managing Docker environments no matter where they are. Docker Networks? Simplified. Deploying new Containers? Easier than ever. Managing containers deployed with Docker Compose? Never been easier. Get started with Portainer RIGHT NOW! 🔥🔥Commands: 🤍 🔥🔥Join the NetworkChuck Academy!: 🤍 Sponsored by Linode SUPPORT NETWORKCHUCK - ➡️NetworkChuck membership: 🤍 ☕☕ COFFEE and MERCH: 🤍 Check out my new channel: 🤍 🆘🆘NEED HELP?? Join the Discord Server: 🤍 STUDY WITH ME on Twitch: 🤍 READY TO LEARN?? - -Learn Python: 🤍 -Get your CCNA: 🤍 FOLLOW ME EVERYWHERE - Instagram: 🤍 Twitter: 🤍 Facebook: 🤍 Join the Discord server: 🤍 0:00 ⏩ Intro 1:25 ⏩ Which Portainer deployment is right for me? 3:24 ⏩ Time to install Portainer! 5:18 ⏩ No more CLI…. Time for the Portainer GUI 7:35 ⏩ This part is going to be really hard! 8:25 ⏩ How to manage other Docker environments ft. Abbey 11:02 ⏩ Things to look out for in Portainer 11:59 ⏩ Outro AFFILIATES & REFERRALS - (GEAR I USE...STUFF I RECOMMEND) My network gear: 🤍 Amazon Affiliate Store: 🤍 Buy a Raspberry Pi: 🤍 Do you want to know how I draw on the screen?? Go to 🤍 and use code NetworkChuck to get 20% off!! #Portainer #Linode #Containers

Secure Containers Easily with Base Image Management

147
1
0
00:11:18
02.11.2021

Greatly reduce vulnerabilities using Snyk's advanced container analysis. This session focuses specifically on the Base Image Management capabilities. Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more. Learn more about Snyk 🤍 📱Social Media📱 _ Twitter: 🤍 Facebook: 🤍 LinkedIn: 🤍 Website: 🤍

Patterns for secure container base image management - Gareth Rushgrove

359
6
0
00:29:42
09.11.2020

Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more. Learn more about Snyk 🤍 Test Your Projects. Find, prioritize and fix vulnerabilities in open source code & containers with Snyk: 🤍 📱Social Media📱 _ Twitter: 🤍 Facebook: 🤍 LinkedIn: 🤍 Website: 🤍

Image Access Management | Docker Business Subscription

2578
8
3
00:05:30
06.10.2021

Image Access Management allows organizations to secure their software supply chain by managing which container images developers can use. Image Access Management also allows you to gain more control by configuring Docker Hub organizations to only allow limited subsets of images (groups or namespaces). Peter walks through how Image Access Management allows admins to restrict access to only Docker Official or Docker Verified Publisher images — our premier content on Docker Hub. Contact Sales to get started with Docker Business: 🤍

Container Security: Container Vulnerability Scanning with Snyk

6663
92
7
00:08:39
12.11.2020

Developers are increasingly being tapped to not only write secure code but also to build up container images. This adds the complexity of navigating the minefield of operating system-level vulnerabilities, a task that historically was handled by other teams. Snyk container vulnerability scanning empowers developers with tools that can be implemented at all stages in the SDLC pipeline including, most importantly, their workstations. Snyk helps software-driven businesses develop fast and stay secure. In addition to container security scans, Snyk can continuously monitor to find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more. Learn more about Snyk 🤍 Resources: Container vulnerability management: 🤍 Open source vulnerability scanner: 🤍 Open source management: 🤍 📱Social Media📱 _ Twitter: 🤍 Facebook: 🤍 LinkedIn: 🤍 Website: 🤍

How to Push and Pull a Docker Image from Docker Hub

63969
850
71
00:08:39
08.07.2020

This video explains How to push the docker image to Docker Hub and how to pull it from Docker Hub Other Video: - How to Deploy Quarkus App in Docker - 🤍 How to implement Logging in SPRING BOOT - 🤍 Follow us on : Website: 🤍 Facebook: 🤍 Twitter: 🤍 Instagram: 🤍 GitHub: 🤍 My Laptop : ASUS ROG Zephyrus G14, 14" - 🤍 ASUS ROG Zephyrus G14, 14" (US) - 🤍 Audio Gear : Maono AU-A04 Condenser Microphone : 🤍 Maono AU-A04 Condenser Microphone (US) :🤍 Secondary Audio : Maono AU-100 Condenser Clip On Lavalier Microphone : 🤍 Recommended Books: Mastering Spring Boot 2.0 (Kindle): 🤍 Mastering Spring Boot 2.0 (US) : 🤍 Building Microservices(Kindle) : 🤍 Building Microservices(US) : 🤍 Spring Boot in Action : 🤍 Spring Boot in Action (US) : 🤍 Spring Microservices in Action : 🤍 Spring Microservices in Action(US): 🤍 Music: - Hear the Noise (Sting): 🤍 “Sound effects obtained from 🤍“ #SpringBoot #Docker #DailyCodeBuffer

How To Remove All Stopped Containers And Unused Images In Docker Prune command in docker

2849
42
5
00:08:17
11.06.2021

In this video, I will explain the prune command which will help to remove containers and images. docker container prune docker system prune Docker Playlist 🤍 All Playlist 🤍 Connect with us: Linkedin- 🤍 Instagram- 🤍 Facebook Group- 🤍 Facebook Page- 🤍 Twitter- 🤍 Blog- 🤍

Your Container Has Vulnerabilities. Now What?

4303
64
3
00:29:13
14.08.2020

You work hard to build the perfect image for your app and then you run your container image through a vulnerability scanner and you get a surprise: vulnerabilities...maybe hundreds of them! It can be overwhelming, particularly if it blocks your app from deployment. But it doesn't have to be and you don't need to become an operating system maintainer and build all your images from `scratch` to deal with vulnerabilities. In this session I'll take you through a pattern for dealing with container image vulnerabilities. We'll look at real container images from the ecosystem and systematically deal with removing vulnerabilities including: * Deciding on a base image: other than just choosing a minimal base image, what can you do to build a set of trusted base images for your organization to use? * Dealing with vulnerabilities introduced by RUN, COPY, and ADD commands * Checking your own code & its dependencies * Dockerfile and docker build tips that will help you deal with vulnerabilities later on * Multistage builds - is there anything they can't do? * A brief look at scratch, distroless, and other advanced options Speaker: Jim Armstrong, Synk Twitter: 🤍jdarmstro

Desktop Apps in Docker Containers with Kasm Workspaces

37005
1043
55
00:15:47
02.11.2021

Desktop Apps In Docker Containers, by using a Container Streaming Platform which is called Kasm. With Kasm you can containerize any application or Linux desktop you can run in Docker. We'll talk about how to use Kasm in your Homelab to containerize your Desktop Apps. Kasm-*: 🤍 Install Kasm Workspaces on Linux: 🤍 Docker Networking Tutorials: 🤍 Follow me: TWITTER: 🤍 INSTAGRAM: 🤍 DISCORD: 🤍 GITHUB: 🤍 BLOG: 🤍 PATREON: 🤍 MY EQUIPMENT: 🤍 Timestamps: 00:00 - Introduction 00:42 - What are Kasm Workspaces? 02:25 - Download and Install Kasm on Linux? 03:19 - How to launch Applications and Desktops 07:44 - Why to use Container Streaming? 10:38 - How to manage Kasm Workspaces 12:48 - Which Docker Images can you use? 15:05 - What's coming next? All links with "*" are affiliate links.

Docker Local Registry Setup | Docker Tutorial for Beginners

10412
205
15
00:15:59
06.09.2021

In this video we are going to learn about creating docker local registry. You would know about docker hub which is hosted repository. In this docker registry tutorial, we will see step by step process of docker registry setup, configuring in-secure connection through daemon.json, and push images to local registry, pull the images. - Docker Full Course: 🤍 - - docker run -d -p 5000:5000 name registry registry:latest docker run -d -p 5000:5000 restart=always name registry -v $(pwd)/docker-registry:/var/lib/registry registry:latest curl -X GET http://192.168.145.130:5000/v2/_catalog vi /etc/docker/daemon.json { "insecure-registries":["192.168.145.130:5000"], } = Follow me 🤍: 🤍 🤍 🤍 🤍 Music credit: "Royalty Free Music from Bensound"

[Webinar] The Frog, Whale & Butler - Managing Docker Images with Jenkins, Artifactory & Xray

661
5
1
00:51:24
27.06.2018

Managing Docker images from development to production can be difficult for obvious reasons. In this webinar will examine the patterns and the anti-patterns for Docker image management, and how you can build a secure and automated delivery pipeline with Jenkins, Artifactory, and Xray.

Set up Docker Host Hardening to Improve Container Security

1046
18
0
00:07:57
03.07.2021

5 enterprise patch management best practices: 🤍 Dockerfile tutorial: 🤍 Docker Hub security breach response: 🤍 IT professionals need to secure their Docker environments, but that security must extend beyond the container images themselves. Hardening a Docker host creates an additional security level that prevents attackers from reaching the underlying infrastructure and everything on top of it. Stay up to date on the latest IT operations news: 🤍 Follow us on Twitter: 🤍 Like us on Facebook: 🤍 #DockerSecurity #ContainerSecurity #DockerTutorial

Docker Build: Build Secure Containers with Docker and Snyk

5636
48
2
00:58:36
28.01.2021

In this live stream, we will demonstrate a workflow for securing your containers using Snyk Vulnerability Scanning integrated into Docker Desktop and the Docker Hub Container Registry. Sign up for a free Snyk account - 🤍 Snyk Community - 🤍 Snyk blog - 🤍 Tweet - 🤍snyksec Docker CLI Cheat Sheet - 🤍 Guide to Container Security - 🤍 Docker is an open platform for developers to build, share and run modern applications.

[Webinar] The Frog, Butler and Whale - Managing Docker Images with Artifactory, Xray & Jenkins

3090
28
2
00:53:17
07.12.2017

Managing Docker images from development to production can be difficult for obvious reasons; images full of packages containing layers of different file types like a Russian Doll creates a needle in a haystack situation when hunting down security vulnerabilities or dependency issues. On top of worrying about what versions of what images are ready for release, in order to create a streamlined delivery process for Docker images, you also need to incorporate security into your pipeline. This webinar will examine the patterns and the anti patterns for Docker image management, and how you can build a secure and automated delivery pipeline with Jenkins, Artifactory and Xray.

Docker image scanning in AWS ECR - finding vulnerabilities

5492
139
10
00:10:49
13.01.2020

In this video you'll learn how to automatically scan Docker images as soon as you push them to AWS ECR (Elastic Container Registry). Find out how to interpret the results to ensure your production applications are secure and without vulnerabilities.

Manage Docker Containers from a Web UI with Yacht Interactive Dashboards

4165
96
5
00:13:22
24.01.2022

In this video, Brandon 🤍TechHut shows you how to install and use Yacht, an interactive dashboard for installing and managing Docker containers on your system. Yacht is great for visualizing and maintaining your Docker infrastructure. Chapters: 0:00 - Introduction 0:18 - What is Yacht? 1:00 - Installing Yacht 3:32 - Logging into Yacht 4:28 - Installing a SSL Certificate 7:42 - Connecting to the Yacht GUI 8:28 - Adding Tools to Yacht 9:00 - Install Librespeed 12:44 - Conclusion New to Linode? Get started here with a $100 credit → 🤍 Check out Yacht on the Web → 🤍 Check out the Yacht Documentation → 🤍 Subscribe to get notified of new episodes as they come out → 🤍 #Linode #Yacht #Docker #AlternativeCloud #OpenSource Product: Linode, Cloud Computing, Yacht; TechHut;

How to manage Docker containers and hosts using a Web GUI - Easy Beginners Guide

1994
24
2
00:31:24
11.05.2021

How to manage Docker containers and hosts using a Web GUI - Easy Beginners' Guide Video Sections: 00:00 Intro 01:19 Overview of native Docker GUI on Windows 01:58 Install Portainer CE on Docker host 03:44 Portainer GUI initial setup and overview 08:28 Portainer App Templates (HTTPD, NGINX) 14:14 Managing multiple or remote docker hosts using Portainer 20:13 Portainer volume browser 21:09 Docker Engine installed by Snap package manager 29:24 Deploy Docker Compose stacks using Portainer Subsctibe to ElastiCourse for more videos on containers, docker and microservices. = Network Security courses on ElastiCourse/Udemy: Introduction to Fortigate Firewall 🤍 🤍 Fortigate Advanced Configuration 🤍 🤍 Introduction to FortiManager course 🤍 🤍 = AWS Web Application deployment and migration course 🤍 🤍

Rachid Zarouali - Docker Security: Start your Container Journey Safely

217
6
0
00:43:28
12.10.2018

Recording from Jazoon TechDays held in Bern on 2018-09-07. Container security is a vast ecosystem, there’s a lot of tools, project and methods. In this talk we’ll see how to use basic out of the box features and best practices to make your container more secure without adding too much complexity into your container platform. This talk will be a mix of live demos and best practices. We’ll close the talk by giving an overview of some more advanced security features available either out of the box or by using some third party tools.

Securing The Docker Host

6448
302
30
00:42:51
20.07.2021

In this video, we will be taking a look at how to secure the Docker host OS and how to set up audit rules for various docker artifacts. Docker Security Essentials eBook: 🤍 Timestamps 0:00 Introduction 1:30 What we will be covering 2:30 Best OS for hosting Docker 5:46 Minimal operating systems 6:50 The Linux audit framework 12:45 Auditing Tools 13:46 Practical Demonstration - LINKS: Docker Bench for Security: 🤍 Lynis: 🤍 Docker CIS Benchmark: 🤍 PART 2: Register for part 2 of the Docker security series here: 🤍 Learn more about the series here: 🤍 Get $100 In free Linode credit: 🤍 - BLOG ►► 🤍 FORUM ►► 🤍 ACADEMY ►► 🤍 - TWITTER ►► 🤍 INSTAGRAM ►► 🤍 LINKEDIN ►► 🤍 PATREON ►► 🤍 MERCHANDISE ►► 🤍 - CYBERTALK PODCAST ►► 🤍 - We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms. - Thanks for watching! Благодарю за просмотр! Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé Obrigado por assistir دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة - #Docker#DevSecOps

Securing Container Images with Harbor, an Open Source Registry (Americas Webinar)

3107
28
0
00:45:09
19.07.2018

As organizations put containerized applications into production, they quickly discover a fundamental truth: they need a secure way to store, scan, and sign their container images. Harbor is an open source cloud native registry that provides trust, compliance, performance, and interoperability. As a private on-premises registry, Harbor fills a gap for organizations that cannot use a public or cloud-based registry or want a consistent experience across clouds. In this webinar, Harbor product lead James Zabala from VMware will walk through how Harbor works, why it’s depended on by organizations such as Caicloud, and how you can get started with it.”

5 Tips to Create Secure Docker Containers for Java Developers (Brian Vermeer)

10
0
0
00:33:30
04.02.2022

Docker is the most widely used way to containerize your application. With Docker Hub, it is easy to create and pull pre-created images. This is very convenient as you can use these images from Docker Hub to quickly build an image for your Java application. However, the naive way of creating custom Docker images for your Java applications comes with many security concerns. So, how do we make security an essential part of Docker images for Java?

Building a Secure Docker Application

6717
45
2
00:42:26
08.05.2017

Built-in security is one of the most important features in Docker. But to build a secure app, you have to understand how to take advantage of these features. Security begins with the platform, but also requires conscious secure design at all stages of app development. In this session, we'll cover the latest features in Docker security, and how you can leverage them. You'll learn how to add them to your existing development pipeline, as well as how you can and streamline your workflow while making it more secure.

AWS Cloud Containers Conference - Security Best Practices with Amazon ECR

1519
26
0
00:27:32
07.08.2020

In this video, we cover a few best practices on securing your container images on Amazon ECR. Learn more about AWS ECR at - 🤍 Subscribe: More AWS videos 🤍 More AWS events videos 🤍 #AWS #AWSWebinar

Securing The Docker Daemon

7198
282
22
00:38:37
21.07.2021

In this video, we will be taking a look at how to secure the Docker daemon by implementing TLS encryption and user namespaces. Docker Security Essentials eBook: 🤍 Timestamps 0:46 Introduction 1:42 What we will be covering 2:12 Docker communication 4:42 Implementing user namespaces 8:23 Practical Demonstration - LINKS: Docker Bench for Security: 🤍 TLS Certificate Automation Script: 🤍 PART 2: Register for part 2 of the Docker security series here: 🤍 Learn more about the series here: 🤍 Get $100 In free Linode credit: 🤍 - BLOG ►► 🤍 FORUM ►► 🤍 ACADEMY ►► 🤍 - TWITTER ►► 🤍 INSTAGRAM ►► 🤍 LINKEDIN ►► 🤍 PATREON ►► 🤍 MERCHANDISE ►► 🤍 - CYBERTALK PODCAST ►► 🤍 - We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms. - Thanks for watching! Благодарю за просмотр! Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé Obrigado por assistir دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة - #Docker#DevSecOps

Secure Microservices | Container Solutions

97
0
0
00:01:49
28.02.2018

Get an expert introduction to Secure Microservices with our industry-leading training events - run by the experts. Register your interest today: 🤍 In this brand new, two day workshop, the renowned authors of Building Microservices and Using Docker, Sam Newman and Adrian Mouat, take participants from theory to practice. They’ll answer questions about the different pressures that drive how you use Microservices, and help you fold in security thinking to the evolution of your architecture.

Portainerd Series 2 Episode 4 How to secure your container environment

197
2
2
00:51:33
16.12.2021

In this episode, featuring Portainer Technical Evangelists Adolfo Delorenzo and Dimko Zhluktenko, we will cover how to secure your container environment. Orchestrators like Kubernetes are insecure by default. Portainer makes it easy to set up and manage centralized identity and access management (including RBAC). In this session, you'll learn more about - 1. User/team management 2. The 5 predefined roles within RBAC 3. User activity logs 4. Authentication engines integration (Microsoft AD, LDAP, OAuth) 0:00 - 1:52 - Introduction 1:52 - 23:59 - RBAC 23:59 - 27:13 - Authentication logs 27:13 - 28.20 - Activity logs 28:20 - 33.17 - Enforce HTTPS 33.17 - 39:00 - Namespace resource restrictions 39:00 - 42:14 - Kubectl shell within Portainer 42:14 - 51:17 - conclusions 51:17 - 51:32 - bye-bye Get 5 Free Nodes of Portainer Business 🤍 Compare Portainer Business with Portainer CE 🤍 Join the Portainer Community 🤍 Got a Question? Ask the Portainer Community on Slack 🤍 Follow us on social media Twitter 🤍 Reddit 🤍 LinkedIn 🤍 Facebook 🤍 #portainer #kubernetes #5nodesfree

Secure container orchestration at the edge

257
10
0
00:15:44
04.05.2021

Install microk8s: 🤍 The cloud-native way of building software allows for consistency across developer environments and massive scalability of application deployments. Both these attributes are useful for edge, but create new challenges related to security and resilience. Watch this demo to see how Canonical’s modular technology stack addresses these challenges by using well-known cloud primitives. Subscribe to Ubuntu on YouTube for more content like this: 🤍 And follow our other social accounts: LinkedIn: 🤍 Twitter: 🤍 Facebook: 🤍 Instagram: 🤍 For more information visit 🤍 and 🤍 #linux #ubuntu #canonical #opensource

Creating Production Ready Containers: What Devs Need to Know to Secure Their Containers

561
24
2
00:20:01
22.06.2022

Learn how to secure your containers using Node.js. Get started with Docker and follow along → 🤍 It may be simple to create a containerized app, but taking it to production is an entirely different ball game. In this hands-on demo using a Node.js example, we’ll demystify what’s necessary to make a container “production ready” — and go over common best practices for securing your container. You’ll learn how to optimize for three key items: - Image size - Build speed - Security You’ll also learn common techniques for hardening containers, from manual tweaks to multistage builds and popular open-source tools, and the trade-offs between them. After watching this talk, you’ll have what you need to to ship confidently, efficiently, and securely. • Speaker: - Evan Harris, Technical Staff at Slim.AI - Connect with Slim.AI → 🤍 • References: - Getting started documentation for Slim.AI Docker Extension → 🤍 - Install commands for the Slim.ai extension → 🤍 Join the conversation! LinkedIn → 🤍 Twitter → 🤍 Facebook → 🤍 Instagram → 🤍

Назад
Что ищут прямо сейчас на
securely managing Docker images singing hide show nav bar scrolls up down high sierra vmware discord invisible pfp Manappuram Fin. share all is found Yellowfin modding sql query error Realme Narzo gyro delay fix vmware high sierra ccleaner pro crack free lepoldmedia Eshram Card Commission coreldraw free cracked PhonePe login xeno ffxiv seher duaları Feed and Grow Fish Piranha