CYRIN Launches New Docker Lab

Promotion

Docker is a light-weight virtualisation technology to package applications and their dependencies in a virtual container. It greatly simplifies software deployment because Docker containers can run on any Linux, Windows, or MacOS computer. 

Introduction to Docker, Docker Compose and Docker Networking is part of the new IT and DevOps category developed in conjunction with the Rochester Institute of Technology and their Global Cyber Institute

Docker containers are isolated from one another, and a single computer can run a very large number of containers. Knowledge of Docker is essential for anybody involved with modern software development practices.  

Description of the Lab

In this lab students will learn basic Docker commands to pull container images from a registry, run them, change them, and push changes back to the registry. They will learn to use docker-compose to build an application consisting of multiple containers. Finally, they will learn the basics of Docker networking. They can also find this new lab mapped to our NICE Specialty Area or under NICE Work Roles - System Administrator.

The six labs in this IT and DevOps category focus on the best practices in setting up server systems, as well as how to maintain these systems over their lifetimes. 

These labs have you configure real systems software in a virtualised environment, the same software you would utilise on the job.  Whether you're new to IT administration or a developer who needs to better understand the deployment environment, there is something here for you. 

The Docker Lab subscription includes any new labs released in this category during the subscription period.

Inexpensive and tailored to your schedule, CYRIN labs are your entry to the cyber security market. 

To learn more about these specific labs visit us at the CYRIN catalog page

You Might Also Read

Penetration Testing & Ethical Hackers:
 

« A Mysterious New Hacking Group
The Dangers Of Inadequate Data Disposal »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BSI Group

BSI Group

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

Reliance Cyber

Reliance Cyber

Reliance Cyber (formerly Reliance ACSN) help to monitor and manage your organisation’s security infrastructure 24/7, so you can make sure all threats and issues are dealt with.

CerraCap Ventures

CerraCap Ventures

CerraCap Ventures invest globally into early-stage B2B companies in Healthcare, Enterprise AI and Cyber Security.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

Information Technology Solutions (ITS)

Information Technology Solutions (ITS)

Information Technology Solutions is a single source provider for managing and securing mission-critical IT services.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.

RightCue Assurance

RightCue Assurance

RightCue Assurance identify opportunities for improvement in the Information Security for your organisation and work with you to reduce cyber risk.

SIGLA Group

SIGLA Group

SIGLA Group specialize in the design and development of IT and OT solutions, from analysis to design, from implementation to commissioning, as well as consultancy, training and assistance.