Docker Enterprise Operations
In this operations-focused course, you’ll deep dive into all the features of the Docker Enterprise platform, and discover how it enables a secure software supply chain from development to production. We’ll discuss managing and enhancing your Kubernetes and Swarm applications through Universal Control Plane, how to harden image security by building pipelines in Docker Trusted Registry, and how to enhance the security of the Docker Enterprise platform via operational best practices.
Objetivos
Access control in Universal Control Plane
Deploying Swarm and Kubernetes applications on UCP
Container networking patterns
Cluster-wide logging patterns
Automated application health checks
Enhancing platform security
Access control in Docker Trusted Registry
Content Trust in DTRContent Trust in DTR
Security Scanning in DTR
Building image pipelines with webhooks and image promotion
DTR sizing, disk management and remote caching
Cloud computing
Disponible en formato e-learning
Disponible en formato presencial
Disponible en formato a distancia
Descargar la información del curso
Subvención disponible
A través de Fundae, cumpliendo requisitos.
Duración
15 horas
- Dificultad 50%
- Nivel alcanzado 80%
Dirigido a
This course is targeted at students with the following:
Motivations: Leverage all the features of Universal Control Plane and Docker Trusted registry to securely manage containerized applications in a cloud or datacenter.
Roles: System Operators & Administrators
Conocimientos requeridos
Familiarity with the Bash shell
Filesystem navigation and manipulation
Command line text editors like vim or nano
Common tooling like curl, wget and ping
Familiarity with YAML and JSON notation
Basic familiarity with common software development patterns and tools like version control, testing, continuous integration and logging.
Pre-requisitos:
CN110 – Docker Swarm Application Essentials
Temario
Introduction to Docker Enterprise
Universal Control Plane
User Management and Access Control
UCP Orchestration
Container Network Operations
Logging
Application Health & Readiness Checks
Platform Security
Docker Trusted Registry
DTR Organizations and Teams
Content Trust
Image Security Scanning
Repository Automation
Image Management
Lab Requirements
Laptop with WiFi connectivity
Attendees should have the latest Chrome or Firefox installed, and a free account at strigo.io.
Comentarios recientes