Standardization and flexibility are taken to a new level through the use of application containers. Software is used to model infrastructure components and to ensure their rapid adaptability. This makes ICT flexible and scalable and enables its modification to suit your business needs at any time. In this course, we introduce you to the topic of dockers with a particular emphasis on security. You learn how dockers work and how container technologies and SecDevOps approaches produce a secure and more efficient ICT environment.

Like all our training courses, we offer this one for groups and individual persons. It can be held anywhere in the world, either on your premises or in a classroom provided by us.

Dominique Meier

Dominique Meier

Partner & Head of Operations
Questions? Contact us

Documents

Container Security Verification Standard

Contents

The following issues – always with hands-on exercises – are addressed:

  • Docker basics
  • Containers and images
  • Data storage
  • Container networks
  • High availability and scaling
  • Orchestration

Prior knowledge

The training is designed in such a way that participants with little experience with dockers can also grasp the content. But basic knowledge of Linux and experience with operating a terminal are helpful.

Our training courses can be adapted to suit your needs and the needs of your preferred target group. We would gladly discuss the options with you.