Introduction

Learn how containerization works, its benefits, potential vulnerabilities, and the steps necessary to secure your container.

Containerisation technologies such as Docker are popular for developing and deploying applications. In this module, you will learn how Docker works, some common vulnerabilities and various measures that can be taken to secure your container from attack.

Last updated