Container and Microservices Security
This course will explain how to secure a modern, microservice-based system. You’ll start by running and hacking into a vulnerable system before switching roles and using various Docker tools and features to protect the system. While the tutorial focuses on Docker, the techniques demonstrated are generally applicable to any production container system.
- How to respond to an attack
- Scanning images for vulnerabilities
- Limiting the privileges of running containers
- Managing secrets (such as database passwords and API keys)