Container Infrastructure Analysis with Trivy

Want to learn how to find vulnerabilities in docker images? How about preventing these vulnerabilities in the first place? If so, you're in the right place! In this course you will learn Container Infrastructure Analysis with Trivy.
Course info
Level
Intermediate
Updated
Apr 20, 2021
Duration
49m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 20, 2021
Duration
49m
Your 10-day individual free trial includes:

Expert-led courses

Keep up with the pace of change with thousands of expert-led, in-depth courses.
Description

In this course, we will focus on automating docker image security scans:

  1. use Trivy (and a Github Action) to scan Dockerfiles within Github
  2. use Trivy to uncover a malicious image within a Docker registry
  3. perform an analysis on the malicious image to uncover the source of compromise
When you’re finished with this course, you’ll have the skills and knowledge to detect these techniques: Supply Chain Compromise (T1195), Implant Container Image (T1525).
Course FAQ
Course FAQ
What is Trivy?

Trivy is an easy-to-use and comprehensive and open source vulnerability scanner for container images.

What will I learn in this Trivy course?

In this course you will learn how to use Trivy and Github Actions to scan and audit container images for vulnerabilities.

What is a container image?

A container image is an unchangeable, static file that includes executable code so it can run an isolated process on information technology infrastructure.

What are Docker images used for?

Docker images are used to execute code in a Docker container. Docker images act as a set of instructions to build a Docker container, similar to a template.

What is GitHub Actions?

GitHub Actions is a software tool that automates, customizes, and executes your software development workflows right in your repository.

About the author
About the author

Zach’s curiosity has led him to roles in Software Development, DevOps, and Security. By drawing on these fields, Zach’s goal is to empower learners with a unique, cross-discipline skill set.

More from the author
OS Analysis with Wazuh
Intermediate
36m
Dec 21, 2020
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Welcome to Pluralsight and this cybersecurity tools course featuring Trivy, the open source container infrastructure analysis tool developed and maintained by Teepei Fukuda and the Aqua Security Team. As more applications move into containers, it's pivotal that you are able to audit these containers for vulnerabilities. In this course, you will use Trivy to audit a container image for vulnerabilities. Further, you'll use GitHub Actions and Trivy to automatically scan container images as they are being developed. But wait, there's more. You will learn how to prevent vulnerable container images from being released into production. You will also learn how to automatically detect container image tampering. While it would be helpful to have a basic understanding of containers, I got you, and I'll explain container basics as you move throughout the course. If you're a blue teamer looking to defend against container image attacks or a red teamer looking to exploit modern defense patterns, you are in the right place, and all you need to do is continue into this course. I got you.