Attacking and Defending Containers

Bootcamp: Rapid Threat Modeling with GenAI & LLMs - June 6-7, 2024. Only 12 seats left - Secure your spot!
Learning Path
Container Security
Ideal for
Security Engineer
Cloud Engineer
Cloud Labs

Long gone are the monolithic style of applications that scale vertically and become increasingly difficult to secure and update as they get bigger. As organizations around the world embrace the microservices model of development, containers have become some of the most sought-after technologies in DevOps. Container security requires a new approach, new techniques, and different strategies.

Attacking and Defending Containers is your gateway into the world of Container Security. We begin with a look at offensive security methods. Here, we attack containers and containerized deployments, and you’ll learn practical methods of performing container breakouts, exploiting insecure Docker configurations, OS and Kernel-level exploits and more.

Next, we’ll take a deep dive into the defensive security methods. Here, we’ll learn how to defend containers with hands-on labs that take you through Docker Image analysis, container vulnerability assessment, and even setting up a CI pipeline for containers.

Our combination of detailed, trainer-led videos, and hands-on labs means you’ll be spending as much time as possible performing practical exercises and learning real-world strategies and techniques. At the end of this course, you’ll have comprehensive knowledge of both offensive and defensive Container Security that you can directly implement into a full-fledged security workflow.

You might also like these courses

Or explore these Learning Paths


Getting Hands-on with Docker

Analyzing Docker Layers

Initiating a Container Breakout

Trojanizing Docker Images

Understanding Non-root Containers

How Distroless Containers Work

Implementing DockerSlim

OsQuery Monitoring for Containers

Scanning Containers with Clair

Scanning Docker with Docker-Bench

Scanning Container Images with Trivy

Hands-on. Defensive. Bleeding-Edge.

There's no other training platform that does all three. Except AppSecEngineer.
Get Our Newsletter
Get Started

Contact Support

1603 Capitol Avenue,
Suite 413A #2898,
Cheyenne, Wyoming 82001,
United States

Copyright AppSecEngineer © 2023