@AkamaiDeveloper
  @AkamaiDeveloper
Akamai Developer | All-In-One Open Source Security Scanner | Docker Image Analysis with Trivy @AkamaiDeveloper | Uploaded March 2023 | Updated October 2024, 18 hours ago.
In the 10th video of our Blue Team Training series, @HackerSploit covers using Trivy to analyze Docker images. Trivy is used by cybersecurity experts to find vulnerabilities & IaC misconfigurations, SBOM discovery, Cloud scanning, Kubernetes security risks, and more.

The full Blue Team Training series is available here: youtube.com/playlist?list=PLTnRtjQN5ieZuL1qgfAQxEIg1Bw4hS8wM

Chapters:
0:00 Introduction
0:26 What We’ll Be Covering
0:45 Prerequisites
1:24 Vulnerability Scanning for Docker Images
4:07 Introduction to Trivy
5:13 Practical Demo
5:30 Obtaining Trivy
6:30 Utilizing Trivy
8:23 Loading Trivy into Docker
9:00 Obtaining an Image to Scan
9:59 Scanning an Image with Trivy
19:52 Conclusion

New to Cloud Computing? Get started here with a $100 credit → linode.com/linodetube
Watch Hackersploit's Red Team Series → youtube.com/watch?v=Vdd4lRXB7zE&list=PLTnRtjQN5iea6dLA_4i3qFFX0kwvdL0bL&index=1
Learn more about Trivy → https://trivy.dev/
Subscribe to get notified of new episodes as they come out → youtube.com/linode?sub_confirmation=1

#BlueTeam #CyberSecurity #Trivy
Product: Blue Team, Trivy, Cybersecurity; @HackerSploit
All-In-One Open Source Security Scanner | Docker Image Analysis with TrivyCreating and Using Terraform Variables | Terraforming Kubernetes Ep 3Scalable Solutions for Handling Massive Amounts of HTTP RedirectsAkamai’s Scalable Live Video Transcoding Cuts both Latency and CostsBuilding with Infrastructure as Code | Terraform, Ansible, and Jenkins Hands-On GuideSet Up PostgreSQL Replication Using repmgr | PostgreSQL Failover Done RightBuild a Blog on Linode Using Tailwind CSS | Bootstrap AlternativeAutomating Terraform Workflows Using Variables | Terraform Tapas Ep 6Build a Full-Stack Customer Support Chat App with the MERN StackThe Power of $PATH in your Hands | DevOps Tools at your FingertipsWazuh is a Cybersecurity Powerhouse | Expert Open Source Security Monitoring & ResponseVirtual Private Cloud from Akamai | Secure Networking Within Your Infrastructure

All-In-One Open Source Security Scanner | Docker Image Analysis with Trivy @AkamaiDeveloper

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER