وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Container Security & CSPM using AQUA, Trivy & Snyk

سرفصل های دوره

Learn Cloud Infra Scanning/CSPM using AQUA and Container Security Scanning using AQUA, Trivy & Snyk with Jenkins


1 - Introduction
  • 1 - Course Introduction and Agenda
  • 2 - About Your Instructor

  • 2 - Basics of Containers and Container Security
  • 3 - What are Containers
  • 4 - Container Security Basics and its tools
  • 5 - About AQUA
  • 6 - Disclaimer AQUA has now removed Trial Account.html
  • 7 - Create an Account on AQUA Now AQUA has removed trial account access

  • 3 - Implementation Scan Container images using AQUA
  • 8 - GitHub Pages for installing docker desktop on windows.txt
  • 8 - Hands On Install Docker on Windows machine
  • 9 - Hands On Create a Docker Hub Account and Docker Hub Repo
  • 10 - Hands On Pull and push a vulnerable docker image to repo in Docker Hub
  • 11 - Hands On Integrate AQUA with Docker Hub and Scan Docker Hub Repo
  • 12 - Hands On Review Container scan results and reports in AQUA
  • 13 - Notes on Docker Commands.html
  • 14 - GitHub Repo for this lecture.txt
  • 14 - Sample Dockerfile.html

  • 4 - Cloud Security Posture Management CSPM
  • 15 - What is CSPM
  • 16 - How AQUA implements CSPM
  • 17 - AWS Free account creation URL.txt
  • 17 - Create an AWS Free tier acount
  • 18 - Hands On Integrate AQUA with AWS
  • 19 - Hands On Run AQUA scan on AWS Infrastructure and view Reports in AQUA
  • 19 - Hands On Run AQUA scan on AWS Infrastructure and view Reports in AQUA EV

  • 5 - Hands On Additional Tools for Container Security
  • 20 - HandsOn Using Trivy from AQUA to perform Container Scan on Windows
  • 20 - TrivyCommands.txt
  • 21 - HandsOn Using Docker scan to perform Container Scan on Windows
  • 21 - dockerscancommands.txt
  • 22 - HandsOn Using Snyk to perform Container Scan on Windows
  • 22 - SnykContainerSecurityScanCli.txt
  • 23 - Learn about False Positive Analysis
  • 24 - Perform False Positive Analysis for Container Security Scans

  • 6 - Additional Resources for Security Engineer Interview Preparation OWASP TOP 10
  • 25 - Why you should learn OWASP TOP 10 before attending any security interview.html
  • 26 - Hands On Install NodeJs for OWASP Juice Shop First Step
  • 27 - Hands On Install OWASP Juice Shop on local System Part 2
  • 28 - Hands On Install Burp Suite on Local System
  • 29 - Hands On Configure Burp Suite with Chrome Browser
  • 30 - Hands On A01 Broken Access Control Basics with Practical and its Controls
  • 31 - Hands On A02 Cryptographic Failures with Practical and its Controls
  • 32 - Hands On A03 Injection with Practical and its Controls
  • 33 - Hands On A04 Insecure Design with Practical and its Controls
  • 34 - Hands On A05 Security Misconfiguration with Practical and its Controls
  • 35 - Hands On A06 Vulnerable and Outdated Components Practical and its Controls
  • 35 - NullByteInjection.txt
  • 36 - Hands On A07 Identification and Authentication Failures and its Controls
  • 36 - passwordbruteforce.txt
  • 37 - Hands On A08 Software and Data Integrity Failures and its Controls
  • 38 - Hands On A09 Security Logging and Monitoring Failures and its Controls
  • 39 - Hands On A10 ServerSide Request Forgery with Practical and its Controls
  • 39 - SSRF-URL.txt

  • 7 - Next Steps
  • 40 - Application Security As a Career
  • 41 - Bonus Lecture.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 18128
    حجم: 1002 مگابایت
    مدت زمان: 200 دقیقه
    تاریخ انتشار: ۳۱ مرداد ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید