________________________________________________________________
 Do you want to take this course remotely or in person?
 Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
 ________________________________________________________________
           
      
    
      
      
      
          
          
          
          
  
     Hardening with Docker, Security, Advanced Docker
 Course Description
 The course is designed for anyone who wants to deepen their knowledge with Docker and the implementation of this technology as a broad application infrastructure within their company. You will learn how to properly "dockerize" applications to make them robust and stable.
 Little by little, the entire process is covered from the implementation of containers within different networks, through the creation of Microservices, to their stable deployment. And all this respecting the best practices for creating and executing this type of applications. In the practical examples, we will test all the advanced techniques that Docker and its ecosystem offers. Thanks to the extensive practical experience of the instructors, we will also focus on the most common problems and the most frequent mistakes of Docker users.
 Who is this course for?
-  System administrators
-  Application developers
-  IT professionals
-  IT students with interest in learning Docker technology
 Previous requirements
-  Knowledge of the Linux operating system (command line work, knowledge of basic shell tools)
- Basic knowledge of Docker (knowledge of basic Docker nomenclature and operations - launching the container, etc.)
-  Prior attendance at our Docker Fundamentals course is highly recommended.
 Course objectives
 Course participants will learn:
-  DevSecOps Profile
-  Create different Docker networks
-  Docker orchestration and microservices
-  Docker Swarm deployment
-  Docker Compose deployment
-  Docker Bench Security Deployment
-  The TUF Upgrade Framework
-  Docker Content Trust
-  Security in Docker: tools and good practices
 Optional tool
-  Your own virtual server to carry out the practices via ssh.
 Course content
 1. DevSecOPs
-  What is DevSecOps
-  From DevOps to DevSecOps
-  DevSecOps implementations
-  DevSecOps Plan, Pillars, Governance
-  DevSecOps Success Criteria
-  DevSecOps Profile
-  DevSecOps tasks, tools, processes and culture
 2. Docker Network
-  Docker Network - Objectives
- Container Network Model (CNM)
-  CNM - Architecture
-  Docker network drivers
-  Bridge
-  Host
-  None
-  Overlay
-  MacVlan
-  Ingress Network
 3. Container Orchestration
-  What is orchestration
-  Docker swarm
-  Docker Swarm components
-  Docker Swarm Commands
-  Docker Compose
-  Installing Docker Compose
-  Docker Compose vs Docker Swarm
-  Docker Compose file structure
-  Basic Docker Compose Commands
 4. Docker Security
-  Docker Bench Security Audits
-  Docker security tools
-  The update framework
-  Docker Notary
-  Docker Content Trust
-  Type of attacks
 Guided practical exercises
-  DockerVolume
-  Docker Swarm
-  Docker Compose
-  Docker best practices
-  Docker Bench Security
-  Docker Content Trust
 According to our hybrid eLearning methodology
 Duration: 115 hours 
 Contains videos