Intermediate

Attacking and Securing Container Registry

Learning Path
Container Security
Ideal for
Developer
DevOps
Security Engineer
Cloud Engineer
5
Hours
3
Lessons
9
Cloud Labs

Container Registry is where product teams can manage Docker Images, perform vulnerability analysis, and lets you set up fully automated Docker pipelines. This course will dive deep into Container Image management, scanning, access management, and more.

We'll start off by learning to manage container images using Harbor, the most popular tool used with Container Registry. You'll learn with the help of hands-on labs how to leverage the security capabilities of this tool, including how to set up image scanning (to look for vulnerabilities), and signatures to determine which images are trusted.

Harbor also let us configure access management, observability, and more. We'll also learn to leverage Harbor’s Tag Security functionality to protect container images. Finally, you'll go through labs that show you how to integrate Container Registry with OAuth and OIDC services.

You might also like these courses

Or explore these Learning Paths

Labs

Harbor-101

Compromise AWS ECR Registry

Public registry

Harbor Image scanning

Harbor Immutable

Harbor ACL

Harbor OIDC ACL

Jenkins Harbor

Harbor Cosign

Hands-on. Defensive. Bleeding-Edge.

There's no other training platform that does all three. Except AppSecEngineer.
Get Our Newsletter
Get Started
X
FOLLOW APPSECENGINEER
CONTACT

Contact Support

help@appsecengineer.com

1603 Capitol Avenue,
Suite 413A #2898,
Cheyenne, Wyoming 82001,
United States

Copyright AppSecEngineer © 2023