Attack and Defense on Docker, Swarm and Kubernetes [February 2021]



2 days

Delivery Method




Seats Available



DATE: 3-4 February 2021

TIME: 09:00 to 17:00 CET/GMT+1

Date Day Time Duration
3 February Wednesday 0900-17:00 CET/GMT +1 8 Hours
4 February Thursday 0900-17:00 CET/GMT +1 8 Hours
(Course timing not suitable? Let us know!)


1:1 call with trainers to help secure your infrastructure!

Containerization and orchestration have dramatically changed the way in which today’s technologies are deployed and managed. Attack and defense techniques require reinvention and security professionals must now acquire the necessary skills to competently protect these environments.


This training is designed for RedTeam and BlueTeam professionals who are looking for practical applied security knowledge on containerization and orchestration from an offensive and defensive point of view. Black Box, Grey Box and White Box analysis are covered on Docker, Docker Swarm and Kubernetes.

From the offensive side, attack techniques related to containers/pods compromising, exploitation, networking abuses, privileges escalation, persistence, lateral movement and node takeover among others will be explained.

On the defensive side, it will be analyzed the common security issues and a secure way of building docker images and YAML deployment files for Swarm and Kubernetes, the right implementation of RBAC access management and vulnerability scanners on files and CI/CD pipelines will also be presented with many other best practices.

Why You Should Take This Course


Who Should Attend

  • Offensive security professionals
  • Cloud security professionals
  • Systems Architects
  • Security Analysts
Anyone interested in learning more about common issues over containerisation, containers orchestrators and their security concerns

Key Learning Objectives

  • Understanding of how Docker, Swarm and Kubernetes work from local to productive environments.

  • Black, grey and white box analysis of Docker, Swarm and Kubernetes with applied offensive techniques.

  • Docker Swarm and Kubernetes securitization.
  • Prerequisite Knowledge

    • Linux basics (including bash and filesystems)
    • Networking basics
    • Pentesting experience (not required)

    Hardware / Software Requirements

    • Laptop with at least 8GB RAM and 40GB free disk space
    • Admin/Root access on your laptop
    • VirtualBox installed

    Your Instructor

    No data was found