All-In-One Open Source Security Scanner Docker Image Analysis with Trivy
In the 10th video of our Blue Team Training series, @HackerSploit covers using Trivy to analyze Docker images. Trivy is used by cybersecurity experts to find vulnerabilities & IaC misconfigurations, SBOM discovery, Cloud scanning, Kubernetes security risks, and more.
The full Blue Team Training series is available here.
Chapters:
0:00 Introduction
0:26 What We’ll Be Covering
0:45 Prerequisites
1:24 Vulnerability Scanning for Docker Images
4:07 Introduction to Trivy
5:13 Practical Demo
5:30 Obtaining Trivy
6:30 Utilizing Trivy
8:23 Loading Trivy into Docker
9:00 Obtaining an Image to Scan
9:59 Scanning an Image with Trivy
19:52 Conclusion
New to Linode? Get started here with a $100 credit!
Watch Hackersploit’s Red Team Series.
Learn more about Trivy.
Subscribe to get notified of new episodes as they come out.
#BlueTeam #CyberSecurity #Trivy
Product: Blue Team, Trivy, Cybersecurity; @HackerSploit