All-In-One Open Source Security Scanner | Docker Image Analysis with Trivy

Subscribers:
1,040,000
Published on ● Video Link: https://www.youtube.com/watch?v=lVGAWdKDS9A



Duration: 20:40
1,209 views
54


In the 10th video of our Blue Team Training series, @HackerSploit covers using Trivy to analyze Docker images. Trivy is used by cybersecurity experts to find vulnerabilities & IaC misconfigurations, SBOM discovery, Cloud scanning, Kubernetes security risks, and more.

The full Blue Team Training series is available here: https://www.youtube.com/playlist?list=PLTnRtjQN5ieZuL1qgfAQxEIg1Bw4hS8wM

Chapters:
0:00 Introduction
0:26 What We’ll Be Covering
0:45 Prerequisites
1:24 Vulnerability Scanning for Docker Images
4:07 Introduction to Trivy
5:13 Practical Demo
5:30 Obtaining Trivy
6:30 Utilizing Trivy
8:23 Loading Trivy into Docker
9:00 Obtaining an Image to Scan
9:59 Scanning an Image with Trivy
19:52 Conclusion

New to Linode? Get started here with a $100 credit → https://www.linode.com/linodetube
Watch Hackersploit's Red Team Series → https://www.youtube.com/watch?v=Vdd4lRXB7zE&list=PLTnRtjQN5iea6dLA_4i3qFFX0kwvdL0bL&index=1
Learn more about Trivy → https://trivy.dev/
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1

#BlueTeam #CyberSecurity #Trivy
Product: Blue Team, Trivy, Cybersecurity; @HackerSploit




Other Videos By Akamai Developer


2023-04-10What Is Big Data and How is it Used? | Explanation and Demo From Code With Tomi
2023-04-07Learn How to Build a Scalable Weather App Using Weather API Integration | Code with Harry
2023-04-05Understanding JSON Web Tokens | JWT Explanation from Tech with Tim
2023-04-03Get Organized with Kanboard | Self-Hosted Project Management App PERFECT for Docker
2023-03-31Websites made EASY with Grav | Flexible, Open Source, Flat-File CMS
2023-03-29Install and Configure GitLab From Scratch on a Linode Server | Easy and Comprehensive Tutorial
2023-03-27Build And Deploy A Full Django API on Linode | Code With Tomi
2023-03-24Incident Response with Fireeye | Final Hackersploit Blue Team Training
2023-03-22Build Your Own Video Streaming Platform | It's Easier Than You Might Think!
2023-03-20The 21 Docker Commands Every Developer Needs to Know
2023-03-17All-In-One Open Source Security Scanner | Docker Image Analysis with Trivy
2023-03-15How to Install and Configure an NFS Linux Server and Client
2023-03-13Run Terminals INSIDE Terminals | The Screen Command on Linux
2023-03-10Disk Analysis with Autopsy | HackerSploit Blue Team Training
2023-03-08Passky Password Manager | Take Control of Your Passwords
2023-03-06Never Lose Anything Again With Homebox on Docker | Homebox Home Inventory Management
2023-03-03Memory Forensics with Volatility | HackerSploit Blue Team Series
2023-03-01Fundamentals of svn | Top Docs with Jay LaCroix
2023-02-27Create Your Own URL Shortener Complete with Analytics | Docker YOURLS Tutorial
2023-02-24Linux Memory Acquisition with LiME | HackerSploit Blue Team Training
2023-02-22Hostnames and Domains on Linux Servers | Top Docs with Jay LaCroix



Tags:
linode
linux
cloud computing
alternative cloud
linux server
open source
sysadmin
cybersecurity
hackersploit
kali linux
cybersecurity careers
hacker exploit
careers in cybersecurity
cyber security
trivy
image analysis
docker image analysis
configuration audits
open source intelligence
open source software
container security
cloud security
kubernetes security
vulnerability scans
docker image vulnerability
vulnerability scanner
trivy container scanner