Instructor: Cory Sabol
Course Length: 4 Hours per class
Price: $25-$150 per session
Includes: Six months of complimentary access to the Antisyphon Cyber Range, certificate of participation, six months access to class recordings.

Course Description
Professionally Evil Container Security (PECSEC) – Fortress Kubernetes: A Comprehensive Guide to Defending and Hardening Kubernetes Systems
This training course aims to equip participants with the skills necessary to defend and harden Kubernetes systems effectively. The curriculum will cover best practices for Kubernetes security, from deploying secure configurations to hardening runtime environments. Learners will explore how to improve the security of their Kubernetes clusters, employ proactive defense mechanisms, and implement robust hardening measures to prevent unauthorized access. Through hands-on exercises, participants will gain practical knowledge to secure their Kubernetes deployments. This course is recommended for anyone involved in managing or securing Kubernetes infrastructures, as well as those interested in mastering Kubernetes security.
Professionally Evil Container Security (PECSEC) – Kubernetes Under Siege: Mastering Penetration Testing Techniques
In this comprehensive training course, participants will gain a deep understanding of the vulnerabilities that could potentially exist within Kubernetes clusters. Learn to think like an attacker, discover ways to exploit security gaps, and understand how to penetrate various defense mechanisms. The course will introduce practical scenarios and hands-on exercises that simulate real-world attacks on Kubernetes, enabling participants to apply their learning immediately. Whether you are a DevOps engineer, a security professional, or just passionate about cybersecurity, this course will empower you with knowledge and skills needed to perform penetration testing in a Kubernetes environment.
Professionally Evil Container Security (PECSEC) – Out of the Box: Strategies for Escaping from Containers
This immersive training course invites participants to delve into the world of container technologies and learn about container escape techniques. Often, container environments are seen as safe spaces; this course, however, challenges that perspective by demonstrating ways in which these seemingly secure environments can be compromised. Through a series of interactive exercises and real-world examples, participants will learn how to identify weaknesses in container configurations and how to escape from containerized environments. This course is ideal for anyone involved with container technologies, keen to enhance their security skills.
Key Takeaways
- Provide an overview of core containerization fundamentals
- Cover the main security risks presented by containerization
- Explore ways to discover and exploit common Docker and Kubernetes security flaws
- Explore the ways in which Kubernetes workloads can be hardened and defended successfully
Who Should Take This Course
Anyone with an interest in container security as it applies to Docker and Kubernetes.
Student Requirements
Students will need a computer capable of running the SamuraiWTF lab VM. Students will be provided with a download to an OVF file of the self-contained lab VM prior to the class starting.
What Each Student Will Be Provided
Each student will receive a PDF of the course material and virtual machine image
Course Instructor

Cory Sabol is a senior consultant with a background in web development, game development, and machine learning. He has done substantial research on the topic of container security, focused primarily on Docker and Kubernetes. In addition to using these skills to identify and exploit misconfigurations during penetration testing engagements, Cory has taught workshops on this topic to other security professionals. Cory also has considerable experience with API security. He has developed custom API security testing frameworks and tooling. He has also led the development efforts on the Arrrspace containerized microservice training target. Currently he is researching game security and developing game security labs and training materials.
Live Training Events
Professionally Evil Container Security (PECSEC) – Kubernetes Under Siege: Mastering Penetration Testing Techniques
OnlineIn this comprehensive training course, participants will gain a deep understanding of the vulnerabilities that could potentially exist within Kubernetes clusters. Learn to think like an attacker, discover ways to exploit security gaps, and understand how to penetrate various defense mechanisms. The course will introduce practical scenarios and hands-on exercises that simulate real-world attacks on Kubernetes, enabling participants to apply their learning immediately. Whether you are a DevOps engineer, a security professional, or just passionate about cybersecurity, this course will empower you with knowledge and skills needed to perform penetration testing in a Kubernetes environment.
Professionally Evil Container Security (PECSEC) – Fortress Kubernetes: A Comprehensive Guide to Defending and Hardening Kubernetes Systems
OnlineThis training course aims to equip participants with the skills necessary to defend and harden Kubernetes systems effectively. The curriculum will cover best practices for Kubernetes security, from deploying secure configurations to hardening runtime environments. Learners will explore how to improve the security of their Kubernetes clusters, employ proactive defense mechanisms, and implement robust hardening measures to prevent unauthorized access. Through hands-on exercises, participants will gain practical knowledge to secure their Kubernetes deployments. This course is recommended for anyone involved in managing or securing Kubernetes infrastructures, as well as those interested in mastering Kubernetes security.