On this page
article
Intro
A lot of software is network-reachable today. This means that it is vulnerable to attacks. Concepts and principles need to be invented and applied to protect software and systems from these attacks.
Setup
Download the OVA file from the network share. Tasks are setup as docker containers on the VM.