Chapter 3

Experimentation

Abstract

The chapter discusses experimentation and different situations where people may use containers in training. There are specific examples to learn from.

Keywords

Deployment; experimentation; containers; IT; training; security; online tools

image

Our next section discusses another use for containers, for development and research. We want to be able experiment in a particular domain. NSM (Network Security Monitoring) is a field that I’ve been very interested in and is primarily focused on analyzing the results of tools. There are many NSM tools available on GNU/Linux systems. An issue that arises is there are no standards for ...

Get Deploying Secure Containers for Training and Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.