All-In-One Open Source Security Scanner Docker Image Analysis with Trivy
In the 10th video of our Blue Team Training series, @HackerSploit covers using Trivy to analyze Docker images. Trivy is used by cybersecurity experts to find vulnerabilities & IaC misconfigurations, SBOM discovery, Cloud scanning, Kubernetes security risks, and more.
The full Blue Team Training series is available here.
0:26 What We’ll Be Covering
1:24 Vulnerability Scanning for Docker Images
4:07 Introduction to Trivy
5:13 Practical Demo
5:30 Obtaining Trivy
6:30 Utilizing Trivy
8:23 Loading Trivy into Docker
9:00 Obtaining an Image to Scan
9:59 Scanning an Image with Trivy
New to Linode? Get started here with a $100 credit!
Watch Hackersploit’s Red Team Series.
Learn more about Trivy.
Subscribe to get notified of new episodes as they come out.
#BlueTeam #CyberSecurity #Trivy
Product: Blue Team, Trivy, Cybersecurity; @HackerSploit
Disk Analysis with Autopsy | HackerSploit Blue Team Training
You might also like…
All-In-One Open Source Security Scanner Docker Image Analysis with TrivyTrivy is used by cybersecurity experts to find vulnerabilities & IaC misconfigurations, SBOM discovery and more.
Self Signed Certificates | Top Docs with Jay LaCroixSelf-signed TLS certificates are suitable for personal use or for applications that are used internally within an organization.
What Exactly is High Availability? Failover & High Availability Demonstration from ZSecurityHigh availability (HA) is a term that describes a website or application with maximum uptime and accessibility for the content stored on it.
How to Secure WordPress | HackerSploit Linux SecurityIn this video, Alexis from Hackersploit will walk you through some of the steps you should take to secure your WordPress website.