-
Course
- Security
Protective Technology with Dockle
Learn all about configuring and validating hardened best-practice docker images. In this course, you will learn the setup, configuration, and validation of Dockle in an enterprise environment.
What you'll learn
Would you like to start implementing NIST cybersecurity framework protective technology tools? In this course, Protective Technology with Dockle, you’ll cover how to utilize Dockle to secure a live enterprise environment. First, you’ll see how to use Dockle to check Docker images. Next, you’ll learn to apply specific configurations as well as understand Dockle’s output. Finally, you’ll explore using Dockle in a continuous integration environment. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.
Table of contents
About the author
Peter started out in the nineties as software engineer working on internet banking applications for various European financial institutions. Since 2004, he started specializing in pentesting complex and feature-rich web applications. Currently, he leads a global team of highly skilled and enthusiastic penetration testers as lead pentester.
More Courses by Peter