Course Information
Course Overview
Learn to hack and secure Docker Containers the easy way
This course introduces students to the security concepts associated with Docker. Docker is a popular software and it is widely used in Information Technology Industry. It's popularity also brings a larger attack surface and thus it is important to understand it's security aspects to be able to protect Docker containers. This course is designed for students with any experience. If you never used Docker, its fine we have covered the basics. If you have used Docker for containerizing your applications, we have covered some advanced topics such as escaping from containers to host using misconfigured containers. Regardless of your experience with Docker, we have got you covered here.
Course Content
- 6 section(s)
- 36 lecture(s)
- Section 1 Course Introduction
- Section 2 Fundamentals of Docker
- Section 3 Hacking Docker Containers
- Section 4 Automated Vulnerability Assessment
- Section 5 Defenses
- Section 6 bonus section
What You’ll Learn
- Fundamentals of Docker Images and Containers, How to build your first docker image, How to run your first docker container, Fundamentals of Container Security, Auditing docker containers using automated tools, Docker security fundamentals for Penetration Testers, Common container misconfigurations, Container security concepts that can be applied in DevSecOps pipelines, This course falls into the categories - Cyber Security, Ethical Hacking, Information Security
Reviews
-
RRich S
Great, but a couple of references need updating for 2025.
-
YYash Verma
It is kind of good kickoff for starting docker and docker security , but only when you are looking for basics not in depth. Could have included a little bit more important and detailed stuff like - In Docker - 1.>Different important terminologies in dockerfile and how to write one. 2.>Docker networks 3.>Docker Overlay mounts 4.>Runc and containerd In Docker Security - 1.>Some latest CVEs/campaigns on docker exploits 2.>Exploiting containerd and runc 3.>Some more privileged container attacks 4.>Docker forensics : analyzing image tars and evil images
-
PPiscicelli Santiago Gabriel
Kinda, it's hard to understand the lecturer's english. On top of that, it would be nice if he could explain a little more the commands he is executing, maybe a little cheatsheet on tools instead of rushing through. It would also be nice if he could explain how to protect against these exploits after showing how to execute them, in a couple of them he took the time to explain the exploits, I am searching on the internet and making a list on how to do it, but I'm not an expert. Edit after completing the course: yes, it can be a little rough on some spots, but after these course I've learned how to make a docker image, how to run a container using that image (or downloading one from safe public repositories), how to modify them to make them more secure. How to hack Docker containers and how to patch common vulnerabilities, what is Claire (security tool for Docker) and how to start using it. And some functionalities that I didn't know of such as Cgroups, namespaces,Seccomp and AppArmor. I recommend this course if you don't know anything about containers, it gives a nice and round picture of docker and docker security. 4/5, we need an Anchore tutorial
-
MMartin Plsek
Fundamentals of Docker lesson is very good. From small steps to big goal. Vulnerability section is hard to understand what is behind. I had to study different sources to realize the background. Chapter about defences is not prepared well. No resources (json configuration for apparmor or seccomp). You have to type files yourself slowly.