• Container Modernization with Snyk
  • Prerequisites
    • Set up initial GCP and tools
    • Deploy a GKE cluster
    • Clone the sample application repo
    • Snyk CLI
  • Module 1: Build the Goof applications
    • Step 1: Build the Goof container image
    • Step 2: Deploy the application to GKE
  • Module 2: Secure the Containers
    • Step 3: Exploit a Container Vulnerability
    • Step 4: Scan the Container Image for Vulnerabilities
    • Step 5: Re-deploy the Application to test the fix
  • Module 3: Secure the application
    • Step 6: Monitor your Repo with Snyk
    • Step 7: Exploit a Vulnerable Open Source component
    • Step 8: Fix a vulnerability with a Snyk Pull Request
    • Step 9: Verify the Vulnerability is no longer exploitable.
  • Conclusion
    • Recap
    • Cleanup

Built with from Grav and Hugo

Prerequisites

Prerequisites

  • Set up initial GCP and tools
  • Deploy a GKE cluster
  • Clone the sample application repo
  • Snyk CLI