If playback doesn't begin shortly, try restarting your device.
•
You're signed out
Videos you watch may be added to the TV's watch history and influence TV recommendations. To avoid this, cancel and sign in to YouTube on your computer.
CancelConfirm
Share
An error occurred while retrieving sharing information. Please try again later.
5,811 views • Mar 17, 2023 • #CyberSecurity #BlueTeam #Trivy
Show less
In the 10th video of our Blue Team Training series, @HackerSploit covers using Trivy to analyze Docker images. Trivy is used by cybersecurity experts to find vulnerabilities & IaC misconfigurations, SBOM discovery, Cloud scanning, Kubernetes security risks, and more.
The full Blue Team Training series is available here: • Hackersploit Linux Security | Blue Te...
Chapters:
0:00 Introduction
0:26 What We’ll Be Covering
0:45 Prerequisites
1:24 Vulnerability Scanning for Docker Images
4:07 Introduction to Trivy
5:13 Practical Demo
5:30 Obtaining Trivy
6:30 Utilizing Trivy
8:23 Loading Trivy into Docker
9:00 Obtaining an Image to Scan
9:59 Scanning an Image with Trivy
19:52 Conclusion
New to Cloud Computing? Get started here with a $100 credit → https://www.linode.com/linodetube
Watch Hackersploit's Red Team Series → • Adversary Emulation with Caldera | Re...
Learn more about Trivy → https://trivy.dev/
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_co...#BlueTeam#CyberSecurity#Trivy
Product: Blue Team, Trivy, Cybersecurity; @HackerSploit…...more
All-In-One Open Source Security Scanner | Docker Image Analysis with Trivy
116Likes
5,811Views
2023Mar 17
In the 10th video of our Blue Team Training series, @HackerSploit covers using Trivy to analyze Docker images. Trivy is used by cybersecurity experts to find vulnerabilities & IaC misconfigurations, SBOM discovery, Cloud scanning, Kubernetes security risks, and more.
The full Blue Team Training series is available here: • Hackersploit Linux Security | Blue Te...
Chapters:
0:00 Introduction
0:26 What We’ll Be Covering
0:45 Prerequisites
1:24 Vulnerability Scanning for Docker Images
4:07 Introduction to Trivy
5:13 Practical Demo
5:30 Obtaining Trivy
6:30 Utilizing Trivy
8:23 Loading Trivy into Docker
9:00 Obtaining an Image to Scan
9:59 Scanning an Image with Trivy
19:52 Conclusion
New to Cloud Computing? Get started here with a $100 credit → https://www.linode.com/linodetube
Watch Hackersploit's Red Team Series → • Adversary Emulation with Caldera | Re...
Learn more about Trivy → https://trivy.dev/
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_co...#BlueTeam#CyberSecurity#Trivy
Product: Blue Team, Trivy, Cybersecurity; @HackerSploit…...more