Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Protective Technology with Dockle

Learn all about configuring and validating hardened best-practice docker images. In this course, you will learn the setup, configuration, and validation of Dockle in an enterprise environment.

Intermediate
31m
(3)

Created by Peter Mosmans

Last Updated Jul 31, 2025

Course Thumbnail
  • Course

Protective Technology with Dockle

Learn all about configuring and validating hardened best-practice docker images. In this course, you will learn the setup, configuration, and validation of Dockle in an enterprise environment.

Intermediate
31m
(3)

Created by Peter Mosmans

Last Updated Jul 31, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Would you like to start implementing NIST cybersecurity framework protective technology tools? In this course, Protective Technology with Dockle, you’ll cover how to utilize Dockle to secure a live enterprise environment. First, you’ll see how to use Dockle to check Docker images. Next, you’ll learn to apply specific configurations as well as understand Dockle’s output. Finally, you’ll explore using Dockle in a continuous integration environment. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.

Protective Technology with Dockle
Intermediate
31m
(3)
Table of contents

About the author
Peter Mosmans - Pluralsight course - Protective Technology with Dockle
Peter Mosmans
20 courses 4.5 author rating 571 ratings

Peter started out in the nineties as software engineer working on internet banking applications for various European financial institutions. Since 2004, he started specializing in pentesting complex and feature-rich web applications. Currently, he leads a global team of highly skilled and enthusiastic penetration testers as lead pentester.

Get started with Pluralsight