Blackhat Euro Training : Mastering Container Securityv4 - Extended Edition

Event date 7 December 2020 – 10 December 2020

Location Virtual event

This four day course at Blackhat Europe 2020 is suitable for either offensive or defensive security professionals. The material focuses slightly more on the offensive side than defensive, but does cover key security concerns for securely operating containerized systems.

The course is quite hands-on so likely best suits attendees who will be directly using or attacking container based systems.

Key takeaways for students attending:

  • The building blocks of Docker and how linux containers are fundamentally put together and used.
  • The security concerns inherent in the use of Linux containers and how to address (or attack) those.
  • How Kubernetes works and the key elements of the security of the main components of the Cloud Native Ecosystem.

Your trainer:

Rory has worked in the Information and IT Security arena for the last 19 years in a variety of roles. These days he spends most of his work time on container, cloud and application security. He's an active member of the UK information security community having delivered presentations at a variety of IT and Information security conferences. He has also presented at major containerization conferences and is an author of the CIS Benchmarks for Docker and Kubernetes and main author of NCC Group's Mastering Container Security training.

Categories

  • cyber security
  • training

Contacts

Related content

  • Lights, camera, what about security?

    Nearly two weeks ago, we released a technical advisory detailing how the TP-Link C200 IP camera could be exposed to the infamous Heartbleed bug. Today, Dale Pavey has released a full blog which delves into discoveries he made while assessing the security of popular Internet Protocol (IP) cameras.

  • NCC Group providing ongoing threat intelligence on F5 Networks vulnerability

    ​Last week, a new vulnerability which could allow remote compromise of F5 Networks BIG-IP networking devices was disclosed. In the days following the initial disclosure, NCC Group’s Research Intelligence Fusion Team (RIFT) has closely monitored the vulnerability – setting up a honeypot to learn more about the behavior of threat actors.