An Introduction to Containers using Docker and using it for Security Automation

Abstract

I think most you have heard of the term “containers”. In this puliya session we will learn what, where and how to use containers. Eventually using it to do security automation. Containers can be really powerful and in several cases can be used to setup and run entire an infrastructure in a matter of seconds.

We will be using Docker to understand container technology. Docker is a tool specially crafted for both developers and administrators. It helps everyone to become productive as soon as possible, by fitting into everyone’s primary tool set.

We will start with discussing basics to running multiple applications and service in containers using utilities like docker, docker-compose etc.

This puliya session can be applied in everyday life including office work, personal projects and many more. We will also look at various use cases to automate work flows like system administration, developer automation, security tools automation etc.

Date
Location
Bangalore, India
Avatar
Madhu Akula
Never Ending Learner!

Madhu Akula is a security ninja, published author and cloud native security researcher with an extensive experience. Also he is an active member of the international security, devops and cloud native communities (null, DevSecOps, AllDayDevOps, etc). Hold industry certifications like OSCP (Offensive Security Certified Professional), CKA (Certified Kubernetes Administrator), etc. Madhu frequently speaks and runs training sessions at security events and conferences around the world including DEFCON (24, 26 & 27), BlackHat USA (2018 & 19), USENIX LISA 2018, O’Reilly Velocity EU 2019, Appsec EU 2018, All Day DevOps (2016, 17, 18 & 19), DevSecCon (London, Singapore, Boston), DevOpsDays India, c0c0n(2017, 18), Nullcon (2018, 19), SACON 2019, Serverless Summit, null and multiple others. His research has identified vulnerabilities in over 200+ companies and organisations including; Google, Microsoft, LinkedIn, eBay, AT&T, WordPress, NTOP and Adobe, etc and credited with multiple CVE’s, Acknowledgements and rewards. He is co-author of Security Automation with Ansible2 (ISBN-13: 978-1788394512), which is listed as a technical resource by Red Hat Ansible. Won 1st prize for building Infrastructure Security Monitoring solution at InMobi flagship hackathon among 100+ engineering teams.

Next
Previous