Container Security Learning Path

Learn to run applications in Docker while maintaining a solid security posture.

12 hours, 59 minutes

Quick facts

About this learning path

  • courses

    100% online

  • Duration

    12 hours, 59 minutes

  • Assessment

    questions

About Container Security

Docker and Linux containers are changing the way applications are developed, tested and deployed. The Container Security learning path provides an overview of the key technologies used by Docker containers and how to utilize them for security. The learning path includes a review of Kubernetes, the most popular container orchestration system, focused on creating and running a secure cluster.

 

Syllabus

Container Security Skill Assessment

Assessment - 32 questions

Introduction and Overview of Containers

Course - 00:58:00

As more companies drive towards a container-driven architecture, a solid understanding of container fundamentals is vital. This course provides a solid overview of containers, including Docker, and orchestration of containers at scale with Kubernetes. It also provides guidance on how to reap the benefits of Docker containers while maintaining a solid security posture.
Docker Security

Course - 04:46:00

Learn Docker and containers from Linux kernel primitives that are fundamental for deploying and maintaining a container-based infrastructure. This course covers building secure container images, running containers securely, networking containers and how to manage vulnerabilities in containers across your infrastructure. Dive into Docker with security and confidence.
Kubernetes Security

Course - 05:54:00

Kubernetes has dominated the container orchestration ecosystem. During the move to a cloud-native infrastructure, it's crucial to understand how Kubernetes works with a security frame of mind. This course covers the fundamentals of Kubernetes and advanced topics.

Meet the author

Matt Tesauro

Matt Tesauro specializes in using containers for continuous security at AppSec Pipelines and is a founder of 10Security. Prior work includes Senior AppSec Engineer roles at Duo Security, Pearson and Rackspace. Matt has 20+ years of specializing in application and cloud security. He is a project leader for OWASP AppSec Pipeline & DefectDojo projects.

The AppSec Pipeline project brings DevOps lessons to AppSec while DefectDojo is an application that normalizes output from 70+ different security tools. He holds two degrees from Texas A&M University and several security and Linux certifications.

The details

Learning path insights

How to claim CPEs

Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your CPEs or CPUs.

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All-Source Analyst
  • Mission Assessment Specialist
  • Exploitation Analyst

No software. No set up. Unlimited access.

Skip the server racks and spin up a realistic environment with one click. Infosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every Infosec Skills subscription so your team can skill up however they learn best.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo