Designing Secure Containerized Applications for Embedded Linux Devices

Designing Secure Containerized Applications for Embedded Linux Devices

Linux Foundation via YouTube Direct link

HANDS-ON: USER NAMESPACE IN CONTAINERS

20 of 23

20 of 23

HANDS-ON: USER NAMESPACE IN CONTAINERS

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Designing Secure Containerized Applications for Embedded Linux Devices

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 DISCLAIMERS
  3. 3 WHAT IS A CONTAINER?
  4. 4 WHY CONTAINERS ON EMBEDDED?
  5. 5 CONTAINER INFRASTRUCTURE
  6. 6 SECURING THE CONTAINER IMAGE
  7. 7 CREATE A MINIMAL CONTAINER IMAGE
  8. 8 HANDS-ON: DEBIAN BASED IMAGE
  9. 9 HANDS-ON: ALPINE WITH MULTI-STAGE BUILD
  10. 10 HANDS-ON: STATICALLY LINKED BINARY
  11. 11 CREATE AND RUN IMAGES YOU TRUST
  12. 12 STATIC ANALYSIS TOOLS
  13. 13 SECURITY SCANNING
  14. 14 EASILY UPDATABLE
  15. 15 SECURING THE CONTAINER EXECUTION
  16. 16 RESTRICT CONTAINER PRIVILEGES
  17. 17 DEVICE FILES INSIDE THE CONTAINER
  18. 18 USERS INSIDE CONTAINERS
  19. 19 HANDS-ON: ENABLING USER NAMESPACE
  20. 20 HANDS-ON: USER NAMESPACE IN CONTAINERS
  21. 21 RESTRICTING SYSCALLS
  22. 22 MANAGING RESOURCE USAGE
  23. 23 LINUX SECURITY MODULES

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.