This training course aims to equip participants with the skills necessary to defend and harden Kubernetes systems effectively. The curriculum will cover best practices for Kubernetes security, from deploying secure configurations to hardening runtime environments. Learners will explore how to improve the security of their Kubernetes clusters, employ proactive defense mechanisms, and implement robust hardening measures to prevent unauthorized access. Through hands-on exercises, participants will gain practical knowledge to secure their Kubernetes deployments. This course is recommended for anyone involved in managing or securing Kubernetes infrastructures, as well as those interested in mastering Kubernetes security.
In this comprehensive training course, participants will gain a deep understanding of the vulnerabilities that could potentially exist within Kubernetes clusters. Learn to think like an attacker, discover ways to exploit security gaps, and understand how to penetrate various defense mechanisms. The course will introduce practical scenarios and hands-on exercises that simulate real-world attacks on Kubernetes, enabling participants to apply their learning immediately. Whether you are a DevOps engineer, a security professional, or just passionate about cybersecurity, this course will empower you with knowledge and skills needed to perform penetration testing in a Kubernetes environment.
Exciting Announcement! Join us for the upcoming run of “Professionally Evil Container Security (PECSEC)” with cybersecurity expert Cory Sabol. Mark your calendars for July 11-12, as we dive deep into the…
This immersive training course invites participants to delve into the world of container technologies and learn about container escape techniques. Often, container environments are seen as safe spaces; this course, however, challenges that perspective by demonstrating ways in which these seemingly secure environments can be compromised. Through a series of interactive exercises and real-world examples, participants will learn how to identify weaknesses in container configurations and how to escape from containerized environments. This course is ideal for anyone involved with container technologies, keen to enhance their security skills.
This course is designed to cover the core fundamentals of container and container orchestration security. We’ll explore container security concerns, configuration issues, and how to abuse them as an attacker. Then we’ll switch gears and explore the ways that we can prevent the attacks we just carried out. This will all be done in a hands-on lab driven manner. This class is focused primarily on Docker and Kubernetes but many of the core concepts can be applied to other container technologies.