All of our private classes are customized to your organization's needs.
Click on the button below to send us your details and you will be contacted shortly.
Developers, operators, system administrators, network administrators, and IT security professionals with a strong understanding of Docker technologies desiring a deep understanding of securing Docker environments at scale in an enterprise environment.
This program will be conducted with interactive lectures, PowerPoint presentation, discussion and practical exercise.
By the end of the course successful learners will be able to:
• List all the Linux and network features imposed on containers by the Docker platform, and configure them where configurable
• Design and implement discretionary access control for users on the Docker EE platform
• Fully audit the provenance, contents, and actions taken by containerized software from creation as an image, through testing and QA, and into deployment as a container in production
• Container Security