All-In-One Open Source Security Scanner | Docker Image Analysis with Trivy

Поделиться
HTML-код
  • Опубликовано: 5 авг 2024
  • In the 10th video of our Blue Team Training series, ‪@HackerSploit‬ covers using Trivy to analyze Docker images. Trivy is used by cybersecurity experts to find vulnerabilities & IaC misconfigurations, SBOM discovery, Cloud scanning, Kubernetes security risks, and more.
    The full Blue Team Training series is available here: • Hackersploit Linux Sec...
    Chapters:
    0:00 Introduction
    0:26 What We’ll Be Covering
    0:45 Prerequisites
    1:24 Vulnerability Scanning for Docker Images
    4:07 Introduction to Trivy
    5:13 Practical Demo
    5:30 Obtaining Trivy
    6:30 Utilizing Trivy
    8:23 Loading Trivy into Docker
    9:00 Obtaining an Image to Scan
    9:59 Scanning an Image with Trivy
    19:52 Conclusion
    New to Cloud Computing? Get started here with a $100 credit → www.linode.com/linodetube
    Watch Hackersploit's Red Team Series → • Adversary Emulation wi...
    Learn more about Trivy → trivy.dev/
    Subscribe to get notified of new episodes as they come out → ruclips.net/user/linode?sub_co...
    #BlueTeam #CyberSecurity #Trivy
    Product: Blue Team, Trivy, Cybersecurity; @HackerSploit
  • НаукаНаука

Комментарии • 2