Docker and Kubernetes Security Workshop
This course teaches you how to identify, exploit, and prevent security issues in Docker and Kubernetes environments through practical, hands-on training.
... > Training Courses > Docker and Kubernetes Security Workshop
Docker and Kubernetes Security Workshop
As organizations increasingly adopt containerization and orchestration technologies like Docker and Kubernetes, it is critical to understand the security implications and potential attack surfaces. This 3-day Docker and Kubernetes Security Workshop offers participants guided, hands-on, technical sessions where they will experience firsthand how to attack and exploit containers and Kubernetes clusters.
Goal of the workshop
The purpose of this training is to help participants understand the security challenges of Docker and Kubernetes, identify common misconfigurations, and see how an attacker can abuse and exploit these environments.
By the end of the workshop, participants will have reached the following learning goals:
- Get to know the basics of Docker and Kubernetes security
- Gain an insight into the attack surface of Docker and Kubernetes
- Learn about common security misconfigurations
- Learn to attack and exploit misconfigured containers in a lab environment
- Learn to attack and exploit a misconfigured Kubernetes cluster in a lab environment
Who should join?
This training is suitable for:
- Pentesters
- Developers
- Students
- Security testers
- Security enthusiasts
- General security practitioners
- Anyone with an interest in Docker/Kubernetes and technical affinity

Required skill and expertise
A basic understanding of Linux command line and infrastructure is needed. Experience with Docker or Kubernetes is not required, as all basic concepts will be covered during the workshop.
Program
This three-day workshop combines technical theory and hands-on labs to explore Docker and Kubernetes security, from container basics to real-world attack scenarios.
Day 1: Docker Security
- Technical deep dive into Docker architecture and commands
- Common Docker misconfigurations and exploitation techniques
Hands-on container escape exercises
Day 2: Kubernetes Essentials
- Introduction to Kubernetes architecture and components
- Deploying containers in a Kubernetes cluster
- Hands-on Kubernetes setup and usage
Day 3: Kubernetes Security
- Misconfigurations in Kubernetes and RBAC issues
- Attacking a Kubernetes cluster through chained exploits
- Hands-on hacking session to gain high-level access
More Information
If you are interested in hosting this interactive and tailored training at your company, please let us know via the contact form.

Related

Crystal Box Kubernetes Pentesting
Discover how Bureau Veritas Cybersecurity's Crystal Box Kubernetes Pentesting service can help you secure the complete setup. We offer comprehensive vulnerability assessment and penetration testing for your Kubernetes configurations.

Cloud Security Training
The course gives a comprehensive overview of the OT security landscape, including new insights, threats and challenges. After the training, you will be equipped to assess and defend industrial control systems.

The top 10 Kubernetes findings of our pentesting team
Security specialist Ilona de Bruin shares the most common vulnerabilities she and her colleagues find during their Kubernetes assessments.
Why choose Bureau Veritas Cybersecurity
Bureau Veritas Cybersecurity is your expert partner in cybersecurity. We help organizations identify risks, strengthen defenses and comply with cybersecurity standards and regulations. Our services cover people, processes and technology, ranging from awareness training and social engineering to security advice, compliance and penetration testing.
We operate across IT, OT and IoT environments, supporting both digital systems and connected products. With over 300 cybersecurity professionals worldwide, we combine deep technical expertise with a global presence. Bureau Veritas Cybersecurity is part of the Bureau Veritas Group, a global leader in testing, inspection and certification.