-
Differences Between Development and Production Container Images
-
How to Retrieve an Chainguard Container's SBOM
-
How to Compare Images With chainctl diff
-
How to use the Tag History API
-
How to Debug Chainguard Images
-
How to use Chainguard Containers going forward (1 week, 1 month, 1 year)
-
Multi-stage Builds
-
FIPS Images
-
Packages Overview
-
Test Your Knowledge!

Containers! Containers! Containers!
Course 2 of 8 in Complete Guide To Chainguard Containers
Go deep with your Chainguard Containers skills!
This course is designed to make you a Chainguard Container expert. You'll learn about the significance of different versions, how FIPS images work, and a variety of actions you can take such as retrieving a container image's SBOM, comparing different image versions, and using the chainctl
command line tool.
Learning objectives
At the end of this course, students will be able to:
- Identify and explain the key differences between development and production container images, and understand the security implications of using each variant.
- Retrieve a Chainguard Container's SBOM using the cosign command and understand the information provided in the SBOM, including license details and source code references.
- Use the Tag History API to compare different builds of Chainguard Containers and understand how to identify differences, such as added or removed vulnerabilities, between container image versions.
- Understand FIPS (Federal Information Processing Standards) and how to use FIPS-enabled versions of Chainguard Images to meet compliance requirements, including the use of FIPS-validated cryptography.
- Use the
chainctl
command line interface tool to compare two Chainguard Containers, identify added or removed vulnerabilities, and make informed decisions about container image updates and deployments.
If you have any questions or comments, feel free to reach out at courses@chainguard.dev.
Learn the tools and fundamentals of vulnerability management and why it's critical that every developer understand it.
Learn the tools and fundamentals of vulnerability management and why it's critical that every developer understand it.