Главная
Study mode:
on
1
Introduction
2
ramekin
3
rory
4
What is Trivy
5
Lowhanging fruit
6
Usernamespace mapping
7
Vulnerability scanning
8
Where to run Trivy
9
What Trivy does
10
Scratch images
11
Latest version
12
Identifying files
13
Scanning packages
14
Package maintainers
15
File system scan
16
Kubernetes security checks
17
Code scanning
18
Exploit databases
19
Terraform
20
Cloud Native
21
Mixed Mix
Description:
Explore the world of continuous scanning for misconfigurations and vulnerabilities in container images with this hands-on introduction to Aqua's open-source project, Trivy. Dive into topics such as user namespace mapping, vulnerability scanning, and where to run Trivy effectively. Learn about Trivy's capabilities, including identifying files, scanning packages, and performing Kubernetes security checks. Discover how Trivy handles scratch images, latest versions, and file system scans. Gain insights into code scanning, exploit databases, Terraform, and Cloud Native applications. This comprehensive tutorial covers a wide range of security-related aspects, providing valuable knowledge for maintaining secure container environments.

Hands-on Introduction to Trivy - Continuous Scanning for Container Security

Rawkode Academy
Add to list