Container & Kubernetes
Learn how to keep security in tact for deployments in scale
With organizations rapidly moving towards micro-service style architecture for their applications, container technology seems to be taking over at a rapid rate. Leading container technologies like Docker have risen in popularity and have been widely used because they have helped package and deploy consistent-state applications. Orchestration technologies like Kubernetes help scale such deployments to a massive scale which can potentially increase the overall attack-surface to a massive extent if security is not given the attention required.
The Container Security Training is a foundational training on the concept of Container Security. Containers have emerged as a leading deployment technology. This training delivers a hard-core hands-on view of attacking and defending Containers. Attendees will learn the various attack techniques like container breakouts with several hands-on labs. Subsequently, attendees will learn practical and time-tested approaches to building, running and security testing container deployments.
Kubernetes has emerged as the leading container orchestration and management platform for on-prem and cloud environments. The Kubernetes Security Masterclass, is a hard-core hands-on view of Kubernetes Security from an Attack and Defense perspective. The course takes the participants through a journey where they start with setting up a Kubernetes cluster (simulating an on-prem Kubernetes) deployment, attack the cluster and learn, through multiple deep-dive examples and cookbooks on how they can effectively secure Kubernetes clusters.
- Eugene Ang Beng Choon, SWIFT
I would like to say this training is really good. It helped me learn about the threats specific to containers, dominant attack patterns and corresponding hardening guidelines. One of the best things about the training is the step-by-step methodology followed by the trainers who I felt were clearly very experienced.
Our Application Security and Cloud Security programs is a regular feature at marquee application security conferences across the world.
Can beginners who are new to container technology take this training?
All concepts introduced in the training are explained from the very basics and then transition into advanced security specific topics. This training program is therefore beneficial for both beginners and security engineers who're already comfortable with container technology.
Do I need to know programming in order to attend the class?
While knowing a programming language is useful, prior knowledge of how to code is not necessary. Functionality of the any kind of code introduced in the training will be explained during the class.
In a nutshell, what can I expect to learn from this training?
Attendees can expect to gain a detailed understanding of how containers work, what threat models are specific to their use, how to attack/defend container deployments, how container orchestrators work and how one can attack/defend container orchestrated deployments.
Technologies with rapidly growing adoption rates invite high volumes of malicious intent. Learn about pertinent Docker Security Threats and its hardening methods.
Recently adopted Kubernetes? Have you made security an active consideration in its use? Get started by watching we45’s free webinar on Kubernetes security.