Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of continuous scanning for misconfigurations and vulnerabilities in container images with this hands-on introduction to Aqua's open-source project, Trivy. Dive into topics such as user namespace mapping, vulnerability scanning, and where to run Trivy effectively. Learn about Trivy's capabilities, including identifying files, scanning packages, and performing Kubernetes security checks. Discover how Trivy handles scratch images, latest versions, and file system scans. Gain insights into code scanning, exploit databases, Terraform, and Cloud Native applications. This comprehensive tutorial covers a wide range of security-related aspects, providing valuable knowledge for maintaining secure container environments.
Syllabus
Introduction
ramekin
rory
What is Trivy
Lowhanging fruit
Usernamespace mapping
Vulnerability scanning
Where to run Trivy
What Trivy does
Scratch images
Latest version
Identifying files
Scanning packages
Package maintainers
File system scan
Kubernetes security checks
Code scanning
Exploit databases
Terraform
Cloud Native
Mixed Mix
Taught by
Rawkode Academy