Video: .MP4, 1920x1080 30 fps | Audio: AAC, 44.1 kHz, 2ch | Duration: 9h 29m
Genre: eLearning | Language: English | Size: 1.95 GB
Hello! Welcome to Linux Academy's Scenario Based Docker Security course. This is the second course of a 4 course learning path related to securing containers. The lessons that are presented here focus on the security aspect of Docker through which you will learn how to perform various configurations and navigate through different situations within the context of security. Having a proper configuration without security loopholes and having your software sources, such as container images, as secure as possible is very important.
In the first part of this course, we will begin with a guide on how to install and configure Docker properly. We will talk about resource restrictions where you will learn about Linux cgroups and how they can be used to pose limits on different aspects of your system, as well as learn how to monitor resource and process usage. After that, we will move on to Seccomp - Secure Computing Mode and learn how to configure seccomp profiles. Seccomp is a security tool mechanism that Docker can use to achieve additional security.
Securing software sources is extremely important, which is why we will go over the whole process of creating a repository, creating an image, pushing it to the repository, pulling it, doing some changes, pushing it back and so forth, while keeping in mind the whole time how to achieve optimal security. This is why we will talk about topics such as creating SSL certificates so that the traffic between us and the software source is encrypted. This will be achieved using Certbot and Let's Encrypt. We will talk about the security advantages of private repositories and custom images. You will learn how to create custom images from scratch, specifically two images, where one will be a web server image and the other a MySql Database image. After that, we will take a closer look at Docker Bench. It is a security tool that is also used for optimization. When it runs, it performs a series of scans that give you suggestions on what should or shouldn't be fixed.
When all of this is done, the last part of this course is dedicated to deploying and securing an applications backend. These videos can be viewed as a sort of mini project and review of what has been learned so far. We will be configuring a Docker container to run an Apache web server as an application back end. We will configure a Docker container for which we need to create a custom image to run a Python application (more specifically a Flask application). This application will have an active API that is fully functional and it will achieve a connection to a database for which we will also need to construct a container. So, we will have two Docker containers communicating between each other. We will also set up an Apache web server that will be a gateway to the outer world, so to say. It will be used as a reverse proxy to allow connections from the outer world to reach our containers. Certbot will be utilized for creating an SSL certificate for our domain.
Download link:
Kod:
rapidgator_net:
https://rapidgator.net/file/f6a8249550ea82b4c0b7c0ca039c4e45/ux8l5.Scenario.Based.Docker.Security.part1.rar.html
https://rapidgator.net/file/ff2cf838f6ef834dee0b7123bed4b875/ux8l5.Scenario.Based.Docker.Security.part2.rar.html
https://rapidgator.net/file/626e48280592d45d2fb6508d7cfeebd7/ux8l5.Scenario.Based.Docker.Security.part3.rar.html
nitroflare_com:
https://nitroflare.com/view/BAA914FB1A7E66D/ux8l5.Scenario.Based.Docker.Security.part1.rar
https://nitroflare.com/view/E5D46AF6C07E601/ux8l5.Scenario.Based.Docker.Security.part2.rar
https://nitroflare.com/view/D28B3FDA5AEA71A/ux8l5.Scenario.Based.Docker.Security.part3.rar
Links are Interchangeable - No Password - Single Extraction
Konuyu Favori Sayfanıza Ekleyin