Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Protective Technology with Dockle

Learn all about configuring and validating hardened best-practice docker images. In this course, you will learn the setup, configuration, and validation of Dockle in an enterprise environment.

Peter Mosmans - Pluralsight course - Protective Technology with Dockle
by Peter Mosmans

What you'll learn

Would you like to start implementing NIST cybersecurity framework protective technology tools? In this course, Protective Technology with Dockle, you’ll cover how to utilize Dockle to secure a live enterprise environment. First, you’ll see how to use Dockle to check Docker images. Next, you’ll learn to apply specific configurations as well as understand Dockle’s output. Finally, you’ll explore using Dockle in a continuous integration environment. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.

Table of contents

About the author

Peter Mosmans - Pluralsight course - Protective Technology with Dockle
Peter Mosmans

Peter started out in the nineties as software engineer working on internet banking applications for various European financial institutions. Since 2004, he started specializing in pentesting complex and feature-rich web applications. Currently, he leads a global team of highly skilled and enthusiastic penetration testers as lead pentester.

More Courses by Peter