How to Secure Docker: Explore Attack Vectors and Defenses | Container Security | Part 8

How to Secure Docker: Explore Attack Vectors and Defenses | Container Security | Part 8

HomeAppSecEngineerHow to Secure Docker: Explore Attack Vectors and Defenses | Container Security | Part 8
How to Secure Docker: Explore Attack Vectors and Defenses | Container Security | Part 8
ChannelPublish DateThumbnail & View CountDownload Video
Channel Avatar AppSecEngineer2024-08-28 15:30:00 Thumbnail
91 Views
Here is the next installment in our AppSecEngineer Hands-On Labs Walkthrough series!

In this series, we first dive deep into Docker – to understand what it is and why it has become an indispensable tool in modern software development.

In this video, we dive deep into the security aspects of Docker. We explore different ways to attack Docker containers and deployments, starting with a high-level threat model. Learn about common attack vectors, including container breakouts, Trojan-infected Docker images, and attacks on the Docker daemon. Join us as we demonstrate practical examples and discuss methods to prevent these attacks. Get hands-on experience securing your Docker environment and strengthening your containerized applications.

Get the K8S & Container Security Collection: https://www.appsecengineer.com/containers-kubernetes-security-collection

Get the Pro annual subscription: https://www.appsecengineer.com/pricing

Don’t forget to click the subscribe button and hit the bell icon so you don’t miss any of our next episodes.

#Docker #Container #ContainerSecurity #Cybersecurity #AppSec #InfoSec #InfoSecTraining #Developer #SecurityEngineer #ApplicationSecurity

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.