Différences
Ci-dessous, les différences entre deux révisions de la page.
| Les deux révisions précédentesRévision précédente | |||
| elearning:workbooks:docker3:en:dre07 [2023/12/19 22:23] – admin | elearning:workbooks:docker3:en:dre07 [2024/12/17 13:46] (Version actuelle) – admin | ||
|---|---|---|---|
| Ligne 1: | Ligne 1: | ||
| ~~PDF: | ~~PDF: | ||
| - | Version : **2023.01** | + | Version : **2024.01** |
| Last update : ~~LASTMOD~~ | Last update : ~~LASTMOD~~ | ||
| - | ======DOE606 | + | ======DOE608 |
| ===== Contents===== | ===== Contents===== | ||
| - | * **DOE606 | + | * **DOE608 |
| * Contents | * Contents | ||
| * Course Materials | * Course Materials | ||
| Ligne 27: | Ligne 27: | ||
| =====What this course covered===== | =====What this course covered===== | ||
| + | |||
| + | * **DOE600 - Course Presentation** | ||
| + | * Prerequisites | ||
| + | * Hardware | ||
| + | * Software | ||
| + | * Internet | ||
| + | * Use of the Infrastructure | ||
| + | * Curriculum | ||
| * **DOE601 - Virtualisation by Isolation** | * **DOE601 - Virtualisation by Isolation** | ||
| Ligne 165: | Ligne 173: | ||
| * 3.12 - Restoring Docker Swarm | * 3.12 - Restoring Docker Swarm | ||
| - | * **DOE606 | + | * **DOF606 - Overlay Network Management with Docker in Swarm mode** |
| + | * The Docker Network Model | ||
| + | * LAB #1 - Overlay Network Management | ||
| + | * 1.1 - Creating a network overlay | ||
| + | * 1.2 - Creating a Service | ||
| + | * 1.3 - Moving the Service to another Overlay Network | ||
| + | * 1.4 - DNS container discovery | ||
| + | * 1.5 - Creating a Custom Overlay Network | ||
| + | * LAB #2 - Microservices Architecture Management | ||
| + | * 2.1 - Implementing Docker Swarm with overlay networks | ||
| + | |||
| + | * **DOF607 - Docker Security Management** | ||
| + | * LAB #1 - Using Docker Secrets | ||
| + | * LAB #2 - Creating a Trusted User to Control the Docker Daemon | ||
| + | * LAB #3 - The docker-bench-security.sh script | ||
| + | * LAB #4 - Securing the Docker Host Configuration | ||
| + | * LAB #5 - Securing the Docker daemon configuration | ||
| + | * 5.1 - The / | ||
| + | * LAB #6 - Securing Images and Build Files | ||
| + | * LAB #7 - Securing the Container Runtime | ||
| + | * LAB #8 - Securing Images with Docker Content Trust | ||
| + | * 8.1 - DOCKER_CONTENT_TRUST | ||
| + | * 8.2 - DCT and the docker pull command | ||
| + | * The disable-content-trust option | ||
| + | * 8.3 - DCT and the docker push command | ||
| + | * 8.4 - DCT and the docker build command | ||
| + | * Creating a second Repositry | ||
| + | * Deleting a signature | ||
| + | * LAB #9 - Securing the Docker daemon socket | ||
| + | * 9.1 - Creating the Certificate Authority Certificate | ||
| + | * 9.2 - Creating the Docker Daemon Host Server Certificate | ||
| + | * 9.3 - Creating the Client Certificate | ||
| + | * 9.4 - Starting the Docker Daemon with a Direct Invocation | ||
| + | * 9.5 - Configuring the Client | ||
| + | |||
| + | * **DOE608 | ||
| * Course Materials | * Course Materials | ||
| * What this course covered | * What this course covered | ||
| - | * Validation of Acquired Knowledge | + | * Validation of acquired knowledge |
| * Course Evaluation | * Course Evaluation | ||
| Ligne 177: | Ligne 220: | ||
| ----- | ----- | ||
| - | Copyright © 2023 Hugh Norris - Non-contractual document. The programme is subject to change without notice. | + | Copyright © 2024 Hugh Norris - Non-contractual document. The programme is subject to change without notice. |