Working with Docker Machine, Security, and APIs
Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
Security is an important aspect of an open-source platform; therefore, an in-depth knowledge of Docker security is a must-have for an application developer. In this course, you will learn to work with the Docker Trusted Registry, use the Docker machine, and set up Docker security. You will also learn about the various Docker applications and services.
Target Audience
Technical managers, operations staff, application developers, network administrators, system administrators, and anyone interested in learning about advanced Docker features. A prior knowledge of Docker is assumed.
Prerequisites
None
Expected Duration (hours)
2.2
Lesson Objectives Working with Docker Machine, Security, and APIs
start the course
describe how Docker handles IPv4 and IPv6 addressing
use NDP proxying to connect Docker containers to the Internet via IPv6
describe how Docker uses switched and routed network environments
set up SELinux on CentOS/RHEL/Fedora systems
describe how to allow a nonprivileged volume access to host files from a container
describe how Linux divides the privileges of the root user
share a namespace between two or more containers
create a Docker image with a preinstalled Riak
create an SSHd service in a Docker container
create a Docker container for MongoDB
use Shippable to perform CI/CD and then deploy it on Red Hat's OpenShift
use Drone to configure projects to automatically build, test, and deploy
use Docker with OpenShift Origin to configure Platform-as-a-Service
describe how OpenShift triggers the Docker build and how to supply to the Docker context to build images
use the Docker Trusted Registry Accounts API
use the Docker Trusted Registry Teams API
use the Docker Trusted Registry Accounts Repositories API
use the Docker User Owned Repository Access API
use the Docker Organization Owned Repository Access API
use the Docker Organization Owned Repository Namespace API
describe how the Docker machine creates Docker hosts on your computer or data center
use the Docker machine to create, use, and manage a Docker host inside of VirtualBox
use the Docker machine to use the same interface to create hosts in local, virtual, or cloud platforms
distinguish between the different drivers on the Docker machine and describe the tasks they perform
describe the Docker Machine commands and how they are used
use Docker to create a complex deployment using IP addressing, security, and DTR APIs
Course Number: os_doad_a02_it_enus
Expertise Level
Intermediate