Working with Docker Machine, Security, and APIs


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Security is an important aspect of an open-source platform; therefore, an in-depth knowledge of Docker security is a must-have for an application developer. In this course, you will learn to work with the Docker Trusted Registry, use the Docker machine, and set up Docker security. You will also learn about the various Docker applications and services.

Target Audience
Technical managers, operations staff, application developers, network administrators, system administrators, and anyone interested in learning about advanced Docker features. A prior knowledge of Docker is assumed.

Prerequisites
None

Expected Duration (hours)
2.2

Lesson Objectives

Working with Docker Machine, Security, and APIs

  • start the course
  • describe how Docker handles IPv4 and IPv6 addressing
  • use NDP proxying to connect Docker containers to the Internet via IPv6
  • describe how Docker uses switched and routed network environments
  • set up SELinux on CentOS/RHEL/Fedora systems
  • describe how to allow a nonprivileged volume access to host files from a container
  • describe how Linux divides the privileges of the root user
  • share a namespace between two or more containers
  • create a Docker image with a preinstalled Riak
  • create an SSHd service in a Docker container
  • create a Docker container for MongoDB
  • use Shippable to perform CI/CD and then deploy it on Red Hat's OpenShift
  • use Drone to configure projects to automatically build, test, and deploy
  • use Docker with OpenShift Origin to configure Platform-as-a-Service
  • describe how OpenShift triggers the Docker build and how to supply to the Docker context to build images
  • use the Docker Trusted Registry Accounts API
  • use the Docker Trusted Registry Teams API
  • use the Docker Trusted Registry Accounts Repositories API
  • use the Docker User Owned Repository Access API
  • use the Docker Organization Owned Repository Access API
  • use the Docker Organization Owned Repository Namespace API
  • describe how the Docker machine creates Docker hosts on your computer or data center
  • use the Docker machine to create, use, and manage a Docker host inside of VirtualBox
  • use the Docker machine to use the same interface to create hosts in local, virtual, or cloud platforms
  • distinguish between the different drivers on the Docker machine and describe the tasks they perform
  • describe the Docker Machine commands and how they are used
  • use Docker to create a complex deployment using IP addressing, security, and DTR APIs
  • Course Number:
    os_doad_a02_it_enus

    Expertise Level
    Intermediate