Hacking and Securing Docker Containers

Learn to hack and secure Docker Containers the easy way
Hacking and Securing Docker Containers
File Size :
1.40 GB
Total length :
2h 29m

Category

Instructor

Srinivas .

Language

Last update

7/2021

Ratings

4.1/5

Hacking and Securing Docker Containers

What you’ll learn

Fundamentals of Docker Images and Containers
How to build your first docker image
How to run your first docker container
Fundamentals of Container Security
Auditing docker containers using automated tools
Docker security fundamentals for Penetration Testers
Common container misconfigurations
Container security concepts that can be applied in DevSecOps pipelines
This course falls into the categories – Cyber Security, Ethical Hacking, Information Security

Hacking and Securing Docker Containers

Requirements

This course starts from very basics and thus no Docker experience is required

Description

This course introduces students to the security concepts associated with Docker. Docker is a popular software and it is widely used in Information Technology Industry. It’s popularity also brings a larger attack surface and thus it is important to understand it’s security aspects to be able to protect Docker containers. This course is designed for students with any experience. If you never used Docker, its fine we have covered the basics. If you have used Docker for containerizing your applications, we have covered some advanced topics such as escaping from containers to host using misconfigured containers. Regardless of your experience with Docker, we have got you covered here.

Overview

Section 1: Course Introduction

Lecture 1 Course Introduction

Section 2: Fundamentals of Docker

Lecture 2 Introduction

Lecture 3 Lab setup

Lecture 4 What is Docker?

Lecture 5 Virtual Machines vs Containers

Lecture 6 Building your First Docker Image

Lecture 7 Running your First Docker Container

Lecture 8 Images vs Containers

Lecture 9 cgroups

Lecture 10 Introduction to namespaces

Lecture 11 User namespaces for isolation between containers and host

Lecture 12 Cleaning up Docker containers

Lecture 13 Docker Registry

Section 3: Hacking Docker Containers

Lecture 14 Introduction

Lecture 15 Docker Attack Surface

Lecture 16 Exploiting vulnerable images

Lecture 17 Checking if you are inside the container

Lecture 18 Backdooring existing Docker images

Lecture 19 Privilege escalation using volume mounts

Lecture 20 Introduction to docker.sock

Lecture 21 Container escape using docker.sock

Lecture 22 Docker –privileged flag

Lecture 23 Writing to Kernel Space from a container

Lecture 24 Unused Volumes

Lecture 25 Docker Remote API Basics

Lecture 26 Exploiting Docker Remote API

Lecture 27 Accessing Docker Secrets

Section 4: Automated Vulnerability Assessment

Lecture 28 Introduction

Lecture 29 Automated Assessments using Clair

Lecture 30 Docker bench Security

Section 5: Defenses

Lecture 31 Introduction

Lecture 32 Using apparmor profiles

Lecture 33 Using seccomp profiles

Lecture 34 Using capabilities

Lecture 35 Conclusion

Section 6: bonus section

Lecture 36 Bonus lecture

IT Professionals using Docker containers,IT Professionals planning to use Docker containers,IT Professionals using any orchestration tool such as Docker Swarm, Kubernetes,Anyone who is interested in understanding Docker Security

Course Information:

Udemy | English | 2h 29m | 1.40 GB
Created by: Srinivas .

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top