About Education
Docker Security Training covers the security risks encountered in Docker environments and the best security practices that should be implemented to manage these risks. The training covers Docker's security features, container deployment, Docker host security, Docker registry security and Docker runtime security in detail. Throughout the training, you will gain practical experience with hands-on lab studies.
Prerequisites
It is recommended that you have basic knowledge of Docker before attending this training.
Docker Basic Training or equivalent experience will be an advantage for participants.
Duration of Training
- Instructor-led training: 5 days (with hands-on lab work)
- Virtual instructor-led training: 5 days (with web-based lectures and hands-on labs)
Who Should Participate?
- System administrators
- Network administrators
- DevOps engineers
- Security engineers
- IT operation teams
- Professionals looking to secure Docker environments
Educational Content
- Introduction to Docker Security
- Overview of Docker and its architecture
- Common security risks and challenges in Docker environments
- Security best practices and the importance of risk management
- Docker Security Features and Configuration
- Container isolation and namespaces
- Control groups (cgroups) and resource limits
- Docker images and image security
- Security best practices for Dockerfile
- Docker daemon configuration and security settings
- Secure Container Deployment and Management
- Container deployment models (e.g. Docker Compose, Kubernetes)
- Best practices for container networking and network security
- Confidential information management and encryption
- Container orchestration and management tools (e.g. Docker Swarm, Kubernetes)
- Docker Host Security and Management
- Main operating system security
- Docker host hardening and configuration
- Logging and monitoring for Docker hosts
- Host security best practices and risk management
- Docker Registry Security and Management
- Docker registries overview
- Registry security risks and challenges
- Registry authentication and access control
- Registry encryption and data protection
- Advanced Docker Security Topics
- Container escape vulnerabilities and prevention strategies
- Signing and verifying container image
- Runtime security monitoring and threat detection
- Docker security testing and validation
- Hands-on Laboratory Studies and Exercises
- Practical exercises to reinforce Docker security concepts and best practices
- Scenarios simulating real-world Docker security challenges
- Group discussions and collaboration on security issues and best practices
What You Will Gain at the End of Training
- You will be able to identify security risks in Docker environments and take precautions against these risks.
- You will be able to secure your container-based infrastructures by using Docker's security features effectively.
- You will be able to integrate best practices for container and Docker host security into your workloads.
- You will gain advanced skills to ensure security in Docker environments.