From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,500 courses taught by industry experts.

Exploring container technology and Kubernetes

Exploring container technology and Kubernetes

From the course: Certified Ethical Hacker (CEH)

Exploring container technology and Kubernetes

- [Instructor] Containers and Kubernetes have revolutionized the way that we deploy, the way that we manage, and that we scale applications during the last few decades. Understanding these technologies definitely is crucial for modern software development and for security. So let's dive into the fundamentals of containers and Kubernetes and how they work together. The first thing is, what are containers? Well, you have been using containers throughout this class and throughout this course because you're using Websploit. And within Websploit I have Docker installed, and of course many different Docker containers running those intention of wonderful applications that you have been interacting with. So a container basically is a lightweight, portable unit that packages an application and all the dependencies into a single executable unit. So each of these elements that you are seeing here in this screen, of course, are a package of different application code, runtime, libraries and…

Contents