Différences
Ci-dessous, les différences entre deux révisions de la page.
| Les deux révisions précédentesRévision précédente | |||
| elearning:workbooks:docker3:en:start [2023/12/19 22:21] – admin | elearning:workbooks:docker3:en:start [2024/12/17 13:47] (Version actuelle) – admin | ||
|---|---|---|---|
| Ligne 1: | Ligne 1: | ||
| ~~PDF: | ~~PDF: | ||
| - | Version : **2023.01** | + | Version : **2024.01** |
| Last update : ~~LASTMOD~~ | Last update : ~~LASTMOD~~ | ||
| Ligne 187: | Ligne 187: | ||
| * 3.12 - Restoring Docker Swarm | * 3.12 - Restoring Docker Swarm | ||
| - | * **DOE606 | + | * **DOF606 - Overlay Network Management with Docker in Swarm mode** |
| + | * The Docker Network Model | ||
| + | * LAB #1 - Overlay Network Management | ||
| + | * 1.1 - Creating a network overlay | ||
| + | * 1.2 - Creating a Service | ||
| + | * 1.3 - Moving the Service to another Overlay Network | ||
| + | * 1.4 - DNS container discovery | ||
| + | * 1.5 - Creating a Custom Overlay Network | ||
| + | * LAB #2 - Microservices Architecture Management | ||
| + | * 2.1 - Implementing Docker Swarm with overlay networks | ||
| + | |||
| + | * **DOF607 - Docker Security Management** | ||
| + | * LAB #1 - Using Docker Secrets | ||
| + | * LAB #2 - Creating a Trusted User to Control the Docker Daemon | ||
| + | * LAB #3 - The docker-bench-security.sh script | ||
| + | * LAB #4 - Securing the Docker Host Configuration | ||
| + | * LAB #5 - Securing the Docker daemon configuration | ||
| + | * 5.1 - The / | ||
| + | * LAB #6 - Securing Images and Build Files | ||
| + | * LAB #7 - Securing the Container Runtime | ||
| + | * LAB #8 - Securing Images with Docker Content Trust | ||
| + | * 8.1 - DOCKER_CONTENT_TRUST | ||
| + | * 8.2 - DCT and the docker pull command | ||
| + | * The disable-content-trust option | ||
| + | * 8.3 - DCT and the docker push command | ||
| + | * 8.4 - DCT and the docker build command | ||
| + | * Creating a second Repositry | ||
| + | * Deleting a signature | ||
| + | * LAB #9 - Securing the Docker daemon socket | ||
| + | * 9.1 - Creating the Certificate Authority Certificate | ||
| + | * 9.2 - Creating the Docker Daemon Host Server Certificate | ||
| + | * 9.3 - Creating the Client Certificate | ||
| + | * 9.4 - Starting the Docker Daemon with a Direct Invocation | ||
| + | * 9.5 - Configuring the Client | ||
| + | |||
| + | * **DOE608 | ||
| * Course Materials | * Course Materials | ||
| * What this course covered | * What this course covered | ||
| Ligne 195: | Ligne 230: | ||
| ----- | ----- | ||
| - | Copyright © 2023 Hugh Norris - Non-contractual document. The programme is subject to change without notice. | + | Copyright © 2024 Hugh Norris - Non-contractual document. The programme is subject to change without notice. |