Security continues to remain a key challenge that both Organizations and Security practitioners face with containerized and, serverless deployments. While container orchestrated deployments may be vulnerable to security threats that plague any typical application deployments, they face specific security threats related to the containerization daemon, shared kernel, shared resources, secret management, insecure configurations, role management issues and many more! Serverless deployments on the other hand, face risks such as insecure serverless deployment configurations, Inadequate function monitoring and logging, Broken authentication, Function event data injection & Insecure application secrets storage.
Attacking an infrastructure or Applications leveraging containers and serverless technology requires specific skill-set and a deep understanding of the underlying architecture.
This training has been created with the objective of understanding both offensive and defensive security for container orchestrated and serverless deployments. It will be a 2 day program that will detail through specific theory elements with extensive hands-on exercises that are similar to real-world threat scenarios that the attendees will understand and take part in and, will also understand ways in which containerized and serverless deployments can be attacked, made secure, yet scalable, efficient and effective.
This course is aimed at Developers, DevOps Engineers, Penetration Testers and Security practitioners who plan to use container or serverless technology as part of their product deployments and want to get a good understanding on how to secure their services and deployments.
|Evolution to Container Technology|
|Introduction to Containers|
|Container Technology – Deep dive|
|Container Threat Model|
|Container Security Deep-dive|
|Container Vulnerability Assessment|
|Introduction to Kubernetes|
|Threat-Model of Orchestration technologies|
|Logging & Monitoring Orchestrated deployments|
|Kubernetes Vulnerability Assessment|
|Introduction to Serverless|
|Deploying Application to AWS Lambda|
|Attacking a Serverless Stack|
|Serverless Security Deep-dive|
Please complete your registration on Eventbrite by selecting the ticket ‘Container Security, Orchestration and Serverless training + Regular 2-Day Pass’Register now
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.