Excellent content. Thanks for leading from the front when it comes to an extremely relevant part of the IT landscape. There isn't enough content on containerization and cloud yet. I hope this changes.
Thank you for the feedback. Absolutely, that is exactly what we are trying to do with this series. There aren’t a lot of resources out there pertaining to securing container workloads.
Just discovered your channel. Thanks for producing the great and very relevant content. The link to Part 2 no longer seems to be working. Is there an alternative way to access Part 2 content?
Docker Security Essentials eBook: bit.ly/3j9qRs8
Excellent content. Thanks for leading from the front when it comes to an extremely relevant part of the IT landscape. There isn't enough content on containerization and cloud yet. I hope this changes.
Thank you for the feedback. Absolutely, that is exactly what we are trying to do with this series. There aren’t a lot of resources out there pertaining to securing container workloads.
How People Get Infected With Malicious Word Document:
ua-cam.com/video/E-Xc_bQyG2c/v-deo.html
Just discovered your channel. Thanks for producing the great and very relevant content. The link to Part 2 no longer seems to be working. Is there an alternative way to access Part 2 content?
How difficult is it to get a heart from hackersploit?
Sir how many year consume for the best hacker
Awesome content !!! However, Part-2 registration link is not working
Looks like whether CoreOS nor Rancher is still alive. Are there any other similar alternatives?
Yacht
Thanks bro 🤘
Thank you sir
do cybersecurity professionals require competitive coding?
No, more skill in analysing someone's code is necessary...
sir i you don't mine i to know how to make our own botnet since i have used some tools like byob & ufonet
Sir I want to become a cyber security master for that what I want do sir
Thanks sir
Bro is there a way to create a portable docker for a more versatile use
Hello sir
Whats up everyone
💮🌼😍🌼💮
First viewer
Not First -_-