Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentesRévision précédente | |||
elearning:workbooks:docker3:en:start [2023/12/19 22:21] – admin | elearning:workbooks:docker3:en:start [2024/12/17 13:47] (Version actuelle) – admin | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
~~PDF: | ~~PDF: | ||
- | Version : **2023.01** | + | Version : **2024.01** |
Last update : ~~LASTMOD~~ | Last update : ~~LASTMOD~~ | ||
Ligne 187: | Ligne 187: | ||
* 3.12 - Restoring Docker Swarm | * 3.12 - Restoring Docker Swarm | ||
- | * **DOE606 | + | * **DOF606 - Overlay Network Management with Docker in Swarm mode** |
+ | * The Docker Network Model | ||
+ | * LAB #1 - Overlay Network Management | ||
+ | * 1.1 - Creating a network overlay | ||
+ | * 1.2 - Creating a Service | ||
+ | * 1.3 - Moving the Service to another Overlay Network | ||
+ | * 1.4 - DNS container discovery | ||
+ | * 1.5 - Creating a Custom Overlay Network | ||
+ | * LAB #2 - Microservices Architecture Management | ||
+ | * 2.1 - Implementing Docker Swarm with overlay networks | ||
+ | |||
+ | * **DOF607 - Docker Security Management** | ||
+ | * LAB #1 - Using Docker Secrets | ||
+ | * LAB #2 - Creating a Trusted User to Control the Docker Daemon | ||
+ | * LAB #3 - The docker-bench-security.sh script | ||
+ | * LAB #4 - Securing the Docker Host Configuration | ||
+ | * LAB #5 - Securing the Docker daemon configuration | ||
+ | * 5.1 - The / | ||
+ | * LAB #6 - Securing Images and Build Files | ||
+ | * LAB #7 - Securing the Container Runtime | ||
+ | * LAB #8 - Securing Images with Docker Content Trust | ||
+ | * 8.1 - DOCKER_CONTENT_TRUST | ||
+ | * 8.2 - DCT and the docker pull command | ||
+ | * The disable-content-trust option | ||
+ | * 8.3 - DCT and the docker push command | ||
+ | * 8.4 - DCT and the docker build command | ||
+ | * Creating a second Repositry | ||
+ | * Deleting a signature | ||
+ | * LAB #9 - Securing the Docker daemon socket | ||
+ | * 9.1 - Creating the Certificate Authority Certificate | ||
+ | * 9.2 - Creating the Docker Daemon Host Server Certificate | ||
+ | * 9.3 - Creating the Client Certificate | ||
+ | * 9.4 - Starting the Docker Daemon with a Direct Invocation | ||
+ | * 9.5 - Configuring the Client | ||
+ | |||
+ | * **DOE608 | ||
* Course Materials | * Course Materials | ||
* What this course covered | * What this course covered | ||
Ligne 195: | Ligne 230: | ||
----- | ----- | ||
- | Copyright © 2023 Hugh Norris - Non-contractual document. The programme is subject to change without notice. | + | Copyright © 2024 Hugh Norris - Non-contractual document. The programme is subject to change without notice. |