Module 5: Registry Management Strategies
Image pruning and garbage collection strategies. Registry sizing considerations. Implementing
Image pruning and garbage collection strategies. Registry sizing considerations. Implementing
Auditing container images for vulnerabilities. Setting up security scanning in
Managing user permissions in MSR. Implementing Role-Based Access Control (RBAC)
Understanding MSR architecture and deployment patterns. Containerized components overview. Networking
Overview of container image security challenges. Introduction to MSR and