4.88 out of 5
4.88
8 reviews on Udemy

Hacking and Securing Docker Containers (2019 Edition)

Learn to hack and secure Docker Containers the easy way
Instructor:
CloudSec Training
68 students enrolled
English [Auto-generated]
Docker Basics
Docker Security
Container Misconfigurations
Container Security
Docker Auditing
Docker Penetration Testing
Docker Hacking
DevOps
DevSecOps
Cyber Security
Ethical Hacking
Information Security

This course introduces students to the security concepts associated with Docker. Docker is a popular software and it is widely used in Information Technology Industry. It’s popularity also brings a larger attack surface and thus it is important to understand it’s security aspects to be able to protect Docker containers. This course is designed for students with any experience. If you never used Docker, its fine we have covered the basics. If you have used Docker for containerizing your applications, we have covered some advanced topics such as escaping from containers to host using misconfigured containers. Regardless of your experience with Docker, we have got you covered here.

Course Introduction

1
Course Introduction

Fundamentals of Docker

1
Introduction
2
Lab setup
3
What is Docker?
4
Virtual Machines vs Containers
5
Building your First Docker Image
6
Running your First Docker Container
7
Images vs Containers
8
cgroups
9
Introduction to namespaces
10
User namespaces for isolation between containers and host
11
Cleaning up Docker containers
12
Docker Registry
13
Quiz - Docker basics

Hacking Docker Containers

1
Introduction
2
Docker Attack Surface
3
Exploiting vulnerable images
4
Checking if you are inside the container
5
Backdooring existing Docker images
6
Privilege escalation using volume mounts
7
Introduction to docker.sock
8
Container escape using docker.sock
9
Docker --privileged flag
10
Writing to Kernel Space from a container
11
Dangling Volumes
12
Docker Remote API Basics
13
Exploiting Docker Remote API
14
Accessing Docker Secrets

Automated Vulnerability Assessment

1
Introduction
2
Automated Assessments using Clair
3
Docker bench Security

Defenses

1
Introduction
2
Using apparmor profiles
3
Using seccomp profiles
4
Using capabilities
5
Conclusion
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.9
4.9 out of 5
8 Ratings

Detailed Rating

Stars 5
7
Stars 4
1
Stars 3
0
Stars 2
0
Stars 1
0
bdc5b3b1aff5f2370deaa5b92030a6ee
30-Day Money-Back Guarantee

Includes

2 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion