KubeAcademy by VMware
Supply Chain Security
Next Lesson

Join 80,000+ fellow learners

Get hands-on practice with Kubernetes, track your progress, and more with a free KubeAcademy account.

Log In / Register

In this lesson, we will discuss securing your containerized application before it ever gets to Kubernetes. We will cover securing your application supply chain, tools you can use to scan container images for vulnerabilities, and even what NOT to include in container images.

Hart Hoover

Senior Field Engineer at Kong

Hart Hoover is a Senior Field Engineer at Kong. His expertise lies in technical training, consulting, community building, Linux-based operating systems, computing automation, and cloud application architecture.

View Profile

Give Feedback

Help us improve by sharing your thoughts.

Share