Hacking and Securing Docker Containers
What you’ll learn
Fundamentals of Docker Images and Containers
How to build your first docker image
How to run your first docker container
Fundamentals of Container Security
Auditing docker containers using automated tools
Docker security fundamentals for Penetration Testers
Common container misconfigurations
Container security concepts that can be applied in DevSecOps pipelines
This course falls into the categories – Cyber Security, Ethical Hacking, Information Security
Requirements
This course starts from very basics and thus no Docker experience is required
Description
This course introduces students to the security concepts associated with Docker. Docker is a popular software and it is widely used in Information Technology Industry. It’s popularity also brings a larger attack surface and thus it is important to understand it’s security aspects to be able to protect Docker containers. This course is designed for students with any experience. If you never used Docker, its fine we have covered the basics. If you have used Docker for containerizing your applications, we have covered some advanced topics such as escaping from containers to host using misconfigured containers. Regardless of your experience with Docker, we have got you covered here.
Overview
Section 1: Course Introduction
Lecture 1 Course Introduction
Section 2: Fundamentals of Docker
Lecture 2 Introduction
Lecture 3 Lab setup
Lecture 4 What is Docker?
Lecture 5 Virtual Machines vs Containers
Lecture 6 Building your First Docker Image
Lecture 7 Running your First Docker Container
Lecture 8 Images vs Containers
Lecture 9 cgroups
Lecture 10 Introduction to namespaces
Lecture 11 User namespaces for isolation between containers and host
Lecture 12 Cleaning up Docker containers
Lecture 13 Docker Registry
Section 3: Hacking Docker Containers
Lecture 14 Introduction
Lecture 15 Docker Attack Surface
Lecture 16 Exploiting vulnerable images
Lecture 17 Checking if you are inside the container
Lecture 18 Backdooring existing Docker images
Lecture 19 Privilege escalation using volume mounts
Lecture 20 Introduction to docker.sock
Lecture 21 Container escape using docker.sock
Lecture 22 Docker –privileged flag
Lecture 23 Writing to Kernel Space from a container
Lecture 24 Unused Volumes
Lecture 25 Docker Remote API Basics
Lecture 26 Exploiting Docker Remote API
Lecture 27 Accessing Docker Secrets
Section 4: Automated Vulnerability Assessment
Lecture 28 Introduction
Lecture 29 Automated Assessments using Clair
Lecture 30 Docker bench Security
Section 5: Defenses
Lecture 31 Introduction
Lecture 32 Using apparmor profiles
Lecture 33 Using seccomp profiles
Lecture 34 Using capabilities
Lecture 35 Conclusion
Section 6: bonus section
Lecture 36 Bonus lecture
IT Professionals using Docker containers,IT Professionals planning to use Docker containers,IT Professionals using any orchestration tool such as Docker Swarm, Kubernetes,Anyone who is interested in understanding Docker Security
Course Information:
Udemy | English | 2h 29m | 1.40 GB
Created by: Srinivas .
You Can See More Courses in the IT & Software >> Greetings from CourseDown.com