[Please note that the course is being heavily updated with more videos]
This is the latest version of our previous course Hacking and Securing Docker Containers. This course contains several updates to the previous version.
Updates include:
1. Detailed explanation of how docker images are locally stored
2. How to abuse CAP_SYS_MODULE and write a kernel module to escape the container and get a reverseshell.
3. Scanning Docker Images using Trivy
4. Docker Content Trust
5. 1080p quality videos (compared to 720p in previous version)
This course introduces students to the security concepts associated with Docker. Docker is a popular software and it is widely used in Information Technology Industry. It's popularity also brings a larger attack surface and thus it is important to understand it's security aspects to be able to protect Docker containers. This course is designed for students with any experience. If you never used Docker, its fine we have covered the basics. If you have used Docker for containerizing your applications, we have covered some advanced topics such as escaping from containers to host using misconfigured containers. Regardless of your experience with Docker, we have got you covered here.