Container Registry is where product teams can manage Docker Images, perform vulnerability analysis, and lets you set up fully automated Docker pipelines. This course will dive deep into Container Image management, scanning, access management, and more.
We'll start off by learning to manage container images using Harbor, the most popular tool used with Container Registry. You'll learn with the help of hands-on labs how to leverage the security capabilities of this tool, including how to set up image scanning (to look for vulnerabilities), and signatures to determine which images are trusted.
Harbor also let us configure access management, observability, and more. We'll also learn to leverage Harbor’s Tag Security functionality to protect container images. Finally, you'll go through labs that show you how to integrate Container Registry with OAuth and OIDC services.
Harbor-101
Compromise AWS ECR Registry
Public registry
Harbor Image scanning
Harbor Immutable
Harbor ACL
Harbor OIDC ACL
Jenkins Harbor
Harbor Cosign