A hacker's view on #containers and #K8S
Day 1
1.1 Install docker 1.2 Getting started with Docker 1.3 Creating containers 1.4 Container networking 1.5 Linux namespaces explained 1.6 Backdooring a container 1.7. Vulnerability Scanning 1.8 Container security options 1.9 Docker compliance benchmark 1.10 Optional Struts-RCE 1.11 Optional gaining root
Day 2
2.1 Installing Kubernetes 2.2 Install App Routable Demo 2.3 Kubernetes getting started 2.4 Kubernetes services
Day 3
3.1 Kubernetes Ingress 3.2 Kubernetes Network Policies 3.3 eBPF Introduction 3.4 Scanning pods for vulnerabilities or misconfiguration 3.5 Scanning your K8S cluster 3.6 Cluster communication deepdive 3.7 Cluster API access via pod & Host 3.8 Cluster compliance benchmarking
Appendix
Appendix A - Installing Docker and K8Sdocker_k8s_install Appendix B - Tcpdump Lab Solution Appendix C - Quick App Deployments Appendix D - Installing management tools
Last updated