Intermediate

Attacking and Securing Container Registry

Step into the Spotlight with AppSec Expertise: Use coupon ‘SKILLUP30’ and get 30% Off on Individual Pro Annual Plans.
Learning Path
Container Security
Ideal for
Developer
DevOps
Security Engineer
Cloud Engineer
5
Hours
3
Lessons
9
Cloud Labs

Container Registry is where product teams can manage Docker Images, perform vulnerability analysis, and lets you set up fully automated Docker pipelines. This course will dive deep into Container Image management, scanning, access management, and more.

We'll start off by learning to manage container images using Harbor, the most popular tool used with Container Registry. You'll learn with the help of hands-on labs how to leverage the security capabilities of this tool, including how to set up image scanning (to look for vulnerabilities), and signatures to determine which images are trusted.

Harbor also let us configure access management, observability, and more. We'll also learn to leverage Harbor’s Tag Security functionality to protect container images. Finally, you'll go through labs that show you how to integrate Container Registry with OAuth and OIDC services.

You might also like these courses

Or explore these Learning Paths

Labs

Harbor-101

Compromise AWS ECR Registry

Public registry

Harbor Image scanning

Harbor Immutable

Harbor ACL

Harbor OIDC ACL

Jenkins Harbor

Harbor Cosign

Ready to Elevate Your Security Training?

Empower your teams with the skills they need to secure your applications and stay ahead of the curve.
Get Our Newsletter
Get Started
X
X
Copyright AppSecEngineer © 2023