Completed
- Security vulnerabilities: what they are & how to identify them
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Container Image Security- What It Is and How to Remediate Vulnerabilities
Automatically move to the next video in the Classroom when playback concludes
- 1 - Introduction & agenda
- 2 - Understanding container image security
- 3 - Image security best practices
- 4 - Security vulnerabilities: what they are & how to identify them
- 5 - Scanning for security vulnerabilities: how to do it & what tools to leverage
- 6 - Live Q&A: how can a root privilege container user gain control over the entire host?
- 7 - Live Q&A: how is Trivy different from Amazon's ECR image scanner?
- 8 - Demo: installing Trivy, running samples & generating reports
- 9 - Live Q&A: can Trivy be integrated with Azure DevOps pipelines?
- 10 - Live Q&A: how does Trivy compare to Synk?
- 11 - Live Q&A: where do we need to host Trivy to integrate with CI/CD pipelines?
- 12 - Live Q&A: is there a consolidated view for all images within a private registry?
- 13 - Live Q&A: how can we view report changes over time?
- 14 - Live Q&A: is there a way to expedite the build-time when using Trivy?
- 15 - Live Q&A: can Trivy export to a compatible SonarQube format?
- 16 - Live Q&A: is there a plan to expand Trivy's capabilities to running containers?
- 17 - A look at next week's Tech Talk