CYRIN Launches New Docker Lab

Promotion

Docker is a light-weight virtualisation technology to package applications and their dependencies in a virtual container. It greatly simplifies software deployment because Docker containers can run on any Linux, Windows, or MacOS computer. 

Introduction to Docker, Docker Compose and Docker Networking is part of the new IT and DevOps category developed in conjunction with the Rochester Institute of Technology and their Global Cyber Institute

Docker containers are isolated from one another, and a single computer can run a very large number of containers. Knowledge of Docker is essential for anybody involved with modern software development practices.  

Description of the Lab

In this lab students will learn basic Docker commands to pull container images from a registry, run them, change them, and push changes back to the registry. They will learn to use docker-compose to build an application consisting of multiple containers. Finally, they will learn the basics of Docker networking. They can also find this new lab mapped to our NICE Specialty Area or under NICE Work Roles - System Administrator.

The six labs in this IT and DevOps category focus on the best practices in setting up server systems, as well as how to maintain these systems over their lifetimes. 

These labs have you configure real systems software in a virtualised environment, the same software you would utilise on the job.  Whether you're new to IT administration or a developer who needs to better understand the deployment environment, there is something here for you. 

The Docker Lab subscription includes any new labs released in this category during the subscription period.

Inexpensive and tailored to your schedule, CYRIN labs are your entry to the cyber security market. 

To learn more about these specific labs visit us at the CYRIN catalog page

You Might Also Read

Penetration Testing & Ethical Hackers:
 

« A Mysterious New Hacking Group
The Dangers Of Inadequate Data Disposal »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (Manusec) is a global series of summits focusing on Cyber Security for Critical Manufacturing Sectors.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

IT Career Switch

IT Career Switch

An IT Career Switch Traineeship is the easiest way to start a new career in IT or Cybersecurity with fantastic career prospects.

CyberSwarm

CyberSwarm

CyberSwarm is developing a neuromorphic System-on-a-Chip dedicated to cybersecurity which helps organizations secure communication between connected devices and protect critical business assets.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

ALSCO

ALSCO

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide.

Kivera

Kivera

Kivera enforces your organisation governance and security policies across cloud deployments preventing misconfigurations turning into attack vectors.

Neosoft

Neosoft

Néosoft is an independent digital transformation consulting group with expertise in Consulting & Agility, Cybersecurity, Data, DevOps, Infrastructure & Cloud and Software Engineering.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.

Securafy

Securafy

At Securafy, we understand how important it is to have the right IT partner by your side. For over 30 years, we’ve helped businesses stay secure, connected, and compliant.

Adaptive Security

Adaptive Security

Adaptive is a next-generation cybersecurity platform. We're working with pioneering security teams to protect critical systems from AI-powered cyber attacks.