Container Image Security- What It Is and How to Remediate Vulnerabilities

Container Image Security- What It Is and How to Remediate Vulnerabilities

Mirantis via YouTube Direct link

- Introduction & agenda

1 of 17

1 of 17

- Introduction & agenda

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Container Image Security- What It Is and How to Remediate Vulnerabilities

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Introduction & agenda
  2. 2 - Understanding container image security
  3. 3 - Image security best practices
  4. 4 - Security vulnerabilities: what they are & how to identify them
  5. 5 - Scanning for security vulnerabilities: how to do it & what tools to leverage
  6. 6 - Live Q&A: how can a root privilege container user gain control over the entire host?
  7. 7 - Live Q&A: how is Trivy different from Amazon's ECR image scanner?
  8. 8 - Demo: installing Trivy, running samples & generating reports
  9. 9 - Live Q&A: can Trivy be integrated with Azure DevOps pipelines?
  10. 10 - Live Q&A: how does Trivy compare to Synk?
  11. 11 - Live Q&A: where do we need to host Trivy to integrate with CI/CD pipelines?
  12. 12 - Live Q&A: is there a consolidated view for all images within a private registry?
  13. 13 - Live Q&A: how can we view report changes over time?
  14. 14 - Live Q&A: is there a way to expedite the build-time when using Trivy?
  15. 15 - Live Q&A: can Trivy export to a compatible SonarQube format?
  16. 16 - Live Q&A: is there a plan to expand Trivy's capabilities to running containers?
  17. 17 - A look at next week's Tech Talk

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.