Intermediate

Attacking and Securing Container Registry

Container Security
5
Hours
3
Lessons
9
Cloud Labs

Container Registry is where product teams can manage Docker Images, perform vulnerability analysis, and lets you set up fully automated Docker pipelines. This course will dive deep into Container Image management, scanning, access management, and more.

We'll start off by learning to manage container images using Harbor, the most popular tool used with Container Registry. You'll learn with the help of hands-on labs how to leverage the security capabilities of this tool, including how to set up image scanning (to look for vulnerabilities), and signatures to determine which images are trusted.

Harbor also let us configure access management, observability, and more. We'll also learn to leverage Harbor’s Tag Security functionality to protect container images. Finally, you'll go through labs that show you how to integrate Container Registry with OAuth and OIDC services.

You might also like these courses

Or explore these Learning Paths

Labs

Harbor-101

Compromise AWS ECR Registry

Public registry

Harbor Image scanning

Harbor Immutable

Harbor ACL

Harbor OIDC ACL

Jenkins Harbor

Harbor Cosign