LEARNING PATH: Container Security

Attacking and Defending Containers

Long gone are the monolithic style of applications that scale vertically and become increasingly difficult to secure and update as they get bigger. As organizations around the world embrace the microservices model of development, containers have become some of the most sought-after technologies in DevOps. Container security requires a new approach, new techniques, and different strategies.

Attacking and Defending Containers is your gateway into the world of Container Security. We begin with a look at offensive security methods. Here, we attack containers and containerized deployments, and you’ll learn practical methods of performing container breakouts, exploiting insecure Docker configurations, OS and Kernel-level exploits and more. 

Next, we’ll take a deep dive into the defensive security methods. Here, we’ll learn how to defend containers with hands-on labs that take you through Docker Image analysis, container vulnerability assessment, and even setting up a CI pipeline for containers.

Our combination of detailed, trainer-led videos, and hands-on labs means you’ll be spending as much time as possible performing practical exercises and learning real-world strategies and techniques. At the end of this course, you’ll have comprehensive knowledge of both offensive and defensive Container Security that you can directly implement into a full-fledged security workflow. 

Proficiency Beginner
Audience DevSecOps
Course Duration​ 4
Lessons​ 7
Cloud Labs​ 16



Cloud Security Expert

Course duration




Cloud Labs


  • Containers: An Introduction
    • LXC and Linux Containers
    • Introducing Docker Images and Containers
    • Deep-dive into Docker
  • Docker Commands and Cheatsheet
    • Hands-on: 
      • Docker commands
      • Dockerfile
      • Images
  • Application Deployment Using docker
    • Hands-on
      • Containerize the application
      • Deploying a containerized application
      • Deploy a containerized application using docker-compose
  • Attacking Container Deployments
    • Daemon-related Threats
    • Network related Threats
    • OS and Kernel Threats
    • Threats with Application Libraries
    • Threats from Containerized Applications
  • Attacking Docker Containers


    • Container Breakout
    • Exploiting Insecure Configurations
    • OS and Kernel level exploits
    • Trojanized Docker image
  • Container Security Engineering
    • Building Minimal Containers
    • Distroless and Slim Containers
  • Container Runtime Protections
    • AppArmor/SecComp
    • Restricting Capabilities
  • Container Vulnerability Assessment and Security Analysis
    • Hands-on: Container Vulnerability Assessment
      • Clair 
      • Dagda
      • Anchore
      • Docker-bench
  • Getting Hands-on with Docker
  • Analyzing Docker Layers
  • Initiating a Container Breakout
  • Trojanizing Docker Images
  • Understanding Non-root Containers
  • How Distroless Containers Work
  • Implementing DockerSlim
  • OsQuery Monitoring for Containers
  • Scanning Containers with Clair
  • Scanning Docker with Docker-Bench
  • Scanning Container Images with Trivy
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking "Accept" you consent to the use of All the cookies