top of page

Related Courses

Container Security Bootcamp 2021 Online course

Price: 5.00 USD | Size: 1.86 GB | Duration : 9.45 Hours |4 Video Lessons | 

BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

 

Container Security Bootcamp 2021 Online course

 

 

What's included?

 

  • Become a Container Security Professional (PACOSP)

Learn how to secure the different components in the Docker ecosystem.

 

  • 4 Live Sessions
  • 2.5 hrs per session
  • 1 PACOSP Attempt
  • Recordings of Live Sessions

existed for nearly twenty years, Docker-backed adoption has

ensured that containers are now being used in almost all stages of software production i.e.

development, testing, and deployment. The flexibility to develop and share applications using

Docker and to deploy it at scale using Kubernetes is widely used in the software industry. This

makes a sound understanding of container security a vital skill for every security professional.

In this bootcamp, we start with container basics and cover various attack techniques such as

container breakouts, privilege escalation, host system compromise, malicious image creation,

and cross-container attacks. The learning focus then shifts to securing the different components

of this ecosystem and discussing the industry best practices. This bootcamp helps beginners

learn essential concepts by encouraging them to try every attack hands-on in our purpose-built

labs. As a result, at the end of this bootcamp, you will have the job-ready skills to begin your

journey as a Container Security Professional.

Prerequisites

● Basic Knowledge of Computer and Networking

● Familiarity with Linux Operating System

Course Content

Module I: Introduction to Linux Containers

Objective: Learn the basics of Linux containers and how to use Docker to create, manage and

run containers. Get an introduction to the Open Container Initiative (OCI) and the various layers

of a container system.

1. Container Basics

a. Basic container principles

b. How containers differ from virtual machines (VMs)

c. Namespaces

d. cgroups

2. Introduction to Docker

a. Basic commands and concepts

b. Components i.e. client, daemon, image, container, registry, volume, network

3. Using Docker

a. Pulling an image

b. Running a container

c. Building a container

d. Pushing a container

e. Dockerfile

4. Multi-container deployment

a. Manual setup

b. docker-compose

5. Introduction to low-level components

a. containerd

b. runc

Module II: Attacking Docker Containers

Objective: Understand the threats to a Docker environment with a focus on container

privileges, security boundaries and breakouts. Learn about Linux capabilities. Enforce rules and

policies with seccomp and AppArmor.

1. Docker security

a. Threat modeling

b. Understanding risk vectors

2. Docker container breakouts

a. Privileged containers

b. Mounted volumes

c. Shared namespaces

d. Additional Linux capabilities

i. Process injection (SYS_PTRACE)

ii. Abusing SYS_MODULE capability

Module III: Docker Host Security and Docker Forensics

Objective: Learn how Docker can be exploited to attack the host machine and how to leverage

the Docker registry to attack Docker infrastructure. Explore tools and techniques to perform

analysis and forensics on different components of Docker such as images and containers.

1. Attacking a Docker host

a. Mounted Docker socket

b. World writable socket

c. Exposed Docker socket

2. Management tools as attack vectors

a. Portainer

b. WatchGuard

3. Docker image-based attacks

a. Insecure Docker Registry

b. Evil image

c. Corrupting source image

4. Docker forensics

a. Analyzing images and exported tar archives

b. Container forensics

c. Checkpoints

Module IV: Securing Docker Infrastructure

Objective: Learn about the tools and best practices to secure a Docker environment.

● Securing Docker

○ Auditing socket permissions and Docker group

○ User namespace remapping

○ Auditing runtime

● Monitoring containers

○ Docker events and logs

○ Third-party tools

● Securing Docker images

○ Dockerfile linting and audit

○ Best practices

○ Third-party tools/scanners

● Securing a private registry:

○ Deploying authentication

○ SSL support

Container Security Bootcamp 2021 Online course

SKU: EXT2021-0286
$5.00Price
  • You can Instant Download a PDF file 

    After successful payment, 

    This PDF File Contains Course Download links

    You can Download This Course immediately from the click that Links.  

bottom of page