Docker and Kubernetes Security Workshop

This course teaches you how to identify, exploit, and prevent security issues in Docker and Kubernetes environments through practical, hands-on training.

... > Training Courses > Docker and Kubernetes Security Workshop

Docker and Kubernetes Security Workshop

As organizations increasingly adopt containerization and orchestration technologies like Docker and Kubernetes, it is critical to understand the security implications and potential attack surfaces. This 3-day Docker and Kubernetes Security Workshop offers participants guided, hands-on, technical sessions where they will experience firsthand how to attack and exploit containers and Kubernetes clusters.

Goal of the workshop

The purpose of this training is to help participants understand the security challenges of Docker and Kubernetes, identify common misconfigurations, and see how an attacker can abuse and exploit these environments.

By the end of the workshop, participants will have reached the following learning goals:

  • Get to know the basics of Docker and Kubernetes security
  • Gain an insight into the attack surface of Docker and Kubernetes
  • Learn about common security misconfigurations
  • Learn to attack and exploit misconfigured containers in a lab environment
  • Learn to attack and exploit a misconfigured Kubernetes cluster in a lab environment

Who should join?

This training is suitable for:

  • Pentesters
  • Developers
  • Students
  • Security testers
  • Security enthusiasts
  • General security practitioners
  • Anyone with an interest in Docker/Kubernetes and technical affinity
Image in image block

Required skill and expertise

A basic understanding of Linux command line and infrastructure is needed. Experience with Docker or Kubernetes is not required, as all basic concepts will be covered during the workshop.

Program

This three-day workshop combines technical theory and hands-on labs to explore Docker and Kubernetes security, from container basics to real-world attack scenarios.

Day 1: Docker Security

  • Technical deep dive into Docker architecture and commands
  • Common Docker misconfigurations and exploitation techniques

Hands-on container escape exercises

Day 2: Kubernetes Essentials

  • Introduction to Kubernetes architecture and components
  • Deploying containers in a Kubernetes cluster
  • Hands-on Kubernetes setup and usage

Day 3: Kubernetes Security

  • Misconfigurations in Kubernetes and RBAC issues
  • Attacking a Kubernetes cluster through chained exploits
  • Hands-on hacking session to gain high-level access

More Information

If you are interested in hosting this interactive and tailored training at your company, please let us know via the contact form.

USP

Why choose Bureau Veritas Cybersecurity

Bureau Veritas Cybersecurity is your expert partner in cybersecurity. We help organizations identify risks, strengthen defenses and comply with cybersecurity standards and regulations. Our services cover people, processes and technology, ranging from awareness training and social engineering to security advice, compliance and penetration testing.

We operate across IT, OT and IoT environments, supporting both digital systems and connected products. With over 300 cybersecurity professionals worldwide, we combine deep technical expertise with a global presence. Bureau Veritas Cybersecurity is part of the Bureau Veritas Group, a global leader in testing, inspection and certification.