
EC-Council’s Certified Chief Information Security Officer Program has empowered information security professionals to achieve their professional goals across the globe. It is a program developed and delivered by seasoned security executives. It equips future executives with business and technical knowledge so they can succeed at the highest levels of the security industry. The Program is designed by seasoned CISOs to help train professionals in the business of security. The Certified CISO Program is a global community of security leadership focused on delivering security capabilities aligned to the business.





Many organizations deploy private registry servers in their internal/external application development/deployment environment. Unfortunately, most often, these servers are not securely deployed. In this entirely lab based course, we will look at various configurational vulnerabilities in docker registry servers. In these labs we have used common deployment architectures of a registry server and shown how an attacker can get valuable information out of images stored on the server.