The Docker platform is a key ingredient in the packaging and delivery of container-based application services. This course will give you all the knowledge you need to enable you to securely manage the operation of a Docker platform.
Docker containers are in widespread use as the distribution vehicle for cloud native application services. An important enabler in the process of building, packaging, and running those containers is the Docker platform, which is comprised of several parts. In this course, Securing the Docker Platform, you'll learn about the fundamental aspects of security that relate to the platform components. First, you'll gain a better understanding of the platform components involved and the means of measuring compliance against an industry benchmark standard. Next, you'll discover how to configure the Docker daemon for best practice security, as well as for more flexible access control and authentication. Finally, you'll explore how to apply security controls to other aspects of the platform including a self-hosted Docker registry and a Swarm cluster. By the end of this course, you'll have the necessary knowledge to configure, measure, and optimize effective Docker platform security.
Nigel is an IT professional with over 25 years of experience, gained in technical and management roles, including as CEO of a technical consulting organization. He has recently returned to his technical roots, and provide tuition in the domain of microservices and container technologies.
Course Overview (music) Hi everyone, my name is Nigel Brown and welcome to my course, Securing the Docker Platform. As the leading components of the cloud native paradigm Docker has transformed the way that many organizations, large and small, go about building, packaging, and delivering software applications. The Docker platform is the vehicle for doing this and as sensitive corporate assets are exposed within the platform it's pretty crucial that it's configured to be secure. This course is all about the security controls and mechanisms that can be applied in order to protect those valuable assets. During the course the main topics that we'll cover include using an industry benchmark to baseline the security configuration, enhancing access control using an authorization plugin, deploying a secure registry for application images, and managing the security of a swarm cluster. By the end of the course not only will you have a good understanding of the Docker platforms default security mechanisms, but also the knowledge needed to create more flexible security solutions for your own situation. Ideally before you get going with this course you should already have some practical experience of Linux and some familiarity with the Docker platform and its command line interface. If you want to know how to measure the effectiveness of your existing Docker platform security and how to provide more flexible access patterns to the platform then join me to discover how to secure your Docker platform.