Long gone are the monolithic style of applications that scale vertically and become increasingly difficult to secure and update as they get bigger. As organizations around the world embrace the microservices model of development, containers have become some of the most sought-after technologies in DevOps. Container security requires a new approach, new techniques, and different strategies.
Attacking and Defending Containers is your gateway into the world of Container Security. We begin with a look at offensive security methods. Here, we attack containers and containerized deployments, and you’ll learn practical methods of performing container breakouts, exploiting insecure Docker configurations, OS and Kernel-level exploits and more.
Next, we’ll take a deep dive into the defensive security methods. Here, we’ll learn how to defend containers with hands-on labs that take you through Docker Image analysis, container vulnerability assessment, and even setting up a CI pipeline for containers.
Our combination of detailed, trainer-led videos, and hands-on labs means you’ll be spending as much time as possible performing practical exercises and learning real-world strategies and techniques. At the end of this course, you’ll have comprehensive knowledge of both offensive and defensive Container Security that you can directly implement into a full-fledged security workflow.
Getting Hands-on with Docker
Analyzing Docker Layers
Initiating a Container Breakout
Trojanizing Docker Images
Understanding Non-root Containers
How Distroless Containers Work
Implementing DockerSlim
OsQuery Monitoring for Containers
Scanning Containers with Clair
Scanning Docker with Docker-Bench
Scanning Container Images with Trivy