Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Core Tech

Securing Containers by Breaking in

This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and your application dependencies.

What you'll learn

There’s no better way to understand container security than seeing some live hacking This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and, of course, your application dependencies. Our hacks and advice will help you better understand the mistakes you could make, their implications and how you can avoid them.

Table of contents

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight