Udemy

Hacking and Securing Docker Containers

Enroll Now
  • 1,851 Students
  • Updated 7/2021
4.1
(318 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
2 Hour(s) 29 Minute(s)
Language
English
Taught by
Srinivas .
Rating
4.1
(318 Ratings)

Course Overview

Hacking and Securing Docker Containers

Learn to hack and secure Docker Containers the easy way

This course introduces students to the security concepts associated with Docker. Docker is a popular software and it is widely used in Information Technology Industry. It's popularity also brings a larger attack surface and thus it is important to understand it's security aspects to be able to protect Docker containers. This course is designed for students with any experience. If you never used Docker, its fine we have covered the basics. If you have used Docker for containerizing your applications, we have covered some advanced topics such as escaping from containers to host using misconfigured containers. Regardless of your experience with Docker, we have got you covered here.

Course Content

  • 6 section(s)
  • 36 lecture(s)
  • Section 1 Course Introduction
  • Section 2 Fundamentals of Docker
  • Section 3 Hacking Docker Containers
  • Section 4 Automated Vulnerability Assessment
  • Section 5 Defenses
  • Section 6 bonus section

What You’ll Learn

  • Fundamentals of Docker Images and Containers, How to build your first docker image, How to run your first docker container, Fundamentals of Container Security, Auditing docker containers using automated tools, Docker security fundamentals for Penetration Testers, Common container misconfigurations, Container security concepts that can be applied in DevSecOps pipelines, This course falls into the categories - Cyber Security, Ethical Hacking, Information Security

Reviews

  • R
    Rich S
    4.0

    Great, but a couple of references need updating for 2025.

  • Y
    Yash Verma
    3.0

    It is kind of good kickoff for starting docker and docker security , but only when you are looking for basics not in depth. Could have included a little bit more important and detailed stuff like - In Docker - 1.>Different important terminologies in dockerfile and how to write one. 2.>Docker networks 3.>Docker Overlay mounts 4.>Runc and containerd In Docker Security - 1.>Some latest CVEs/campaigns on docker exploits 2.>Exploiting containerd and runc 3.>Some more privileged container attacks 4.>Docker forensics : analyzing image tars and evil images

  • P
    Piscicelli Santiago Gabriel
    4.0

    Kinda, it's hard to understand the lecturer's english. On top of that, it would be nice if he could explain a little more the commands he is executing, maybe a little cheatsheet on tools instead of rushing through. It would also be nice if he could explain how to protect against these exploits after showing how to execute them, in a couple of them he took the time to explain the exploits, I am searching on the internet and making a list on how to do it, but I'm not an expert. Edit after completing the course: yes, it can be a little rough on some spots, but after these course I've learned how to make a docker image, how to run a container using that image (or downloading one from safe public repositories), how to modify them to make them more secure. How to hack Docker containers and how to patch common vulnerabilities, what is Claire (security tool for Docker) and how to start using it. And some functionalities that I didn't know of such as Cgroups, namespaces,Seccomp and AppArmor. I recommend this course if you don't know anything about containers, it gives a nice and round picture of docker and docker security. 4/5, we need an Anchore tutorial

  • M
    Martin Plsek
    3.0

    Fundamentals of Docker lesson is very good. From small steps to big goal. Vulnerability section is hard to understand what is behind. I had to study different sources to realize the background. Chapter about defences is not prepared well. No resources (json configuration for apparmor or seccomp). You have to type files yourself slowly.

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed