Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Container Security Reality Check - The Container Is Only the Beginning

Red Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore container security realities and best practices in this comprehensive 56-minute talk by a Red Hat container expert. Learn how enterprise IT can leverage containers to boost business agility, implement DevOps processes, and enhance security and control. Discover the security and performance implications of container-based operating systems, images, and registries. Gain insights into managing container lifecycles, addressing security issues, and adapting to changing functional requirements. Understand how to integrate container infrastructure management with existing systems. Delve into topics such as digital enterprise security, evolving IT landscapes, agility metrics, risk management, application trust, enterprise-scale standardization, and the operational model for containerized applications. Debunk container myths and misperceptions while gaining a clear understanding of how containers can transform your organization's approach to application development and deployment.

Syllabus

Intro
How Containers help secure the Digital Enterprise
IT must evolve All businesses must become software companies
New Success Metrics for the CIO
Agility
Customer satisfaction
Infrastructure for the digital business
What containers deliver
Confidence to Deliver
Security is Top Priority and Challenge
Top Breaches 2015
Security Drives Disconnect Between Dev and Ops
Security Is About Managing Risk
Start with Security Fundamentals
Traditional Strategies Under Pressure
Managing your Applications What (who) do you trust?
Enterprise Scale Keeping up-standardize (components) and automate
Enabling Autonomy Diversity. Responsibilities change.
Decompose Applications Complexity becomes an analytics problem
Operational Model for the Enterprise
One Operational Model Any Application, Anywhere
Containerized Application Platform
Abstract Across Hybrid Infrastructure
Infrastructure Security Dependencies
Platform Manages Security
Open Content Ecosystem
OpenShift Container Platform
Dynamic Trust
Red Hat Container Certification UNTRUSTED
Deployment Automation
Eternal Spiral Of Change
Containers enable Autonomy And reduce attack surface
What's Wrong With VMs?
Rethinking Security Strategy

Taught by

Red Hat

Reviews

Start your review of Container Security Reality Check - The Container Is Only the Beginning

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.