25.10.5
This website uses cookies to ensure you get the best experience on our website. Learn more

A Purple Team View - Attacking and Defending Linux, Containers and Kubernetes

James Tan Wee Jing

Learn how to attack and lock down Linux, containers and Kubernetes from Jay Beale, the creator of Bastille Linux. and two Kubernetes tools: the Peirates attack tool and the Bust-a-Kube CTF cluster. In this fully hands-on course, you'll get access to our cloud training environment, where you'll have a Kali Linux system filled with capture-the-flag (CTF) virtual machines and a Kubernetes cluster, which you will attack and defend. Every single topic in the class has an attack exercise, where you use Kali Linux to compromise a system or a Kubernetes cluster scenario. Most have a matching defense exercise, where you will use new skills to break that attack, confident that it will break other attacks. This Linux, Containers and Kubernetes training focuses on giving you practical attack skills from real penetration tests, coupled with solid defenses to break attacks. You will learn and work exercises in both attack and defense on Metasploit and Kali Linux Attacking Public Cloud Services (AWS and GCP) Network and Web application attacks Advanced Privilege Escalation, including via Linux Capabilities and Namespaces AppArmor and SELinux Seccomp and Jails OSSEC and Active Response ModSecurity Web server and proxy attack and defense, including Nginx NoSQL database attack and defense Docker/Container Run-time Attack and Defense Kubernetes Cluster Attacks Defeating and Defending Multi-tenant Clusters Kubernetes RBAC Kubernetes Network Policies and Service Meshes Kubernetes Admission Control: Kyverno, OPA Gatekeeper, etc. Container Breakout and Kubernetes Node Attacks Public Cloud API Attacks Attacking Public Cloud Environments to Compromise Kubernetes

Skills / Knowledge

  • Pentesting
  • Defense

Issued on

May 13, 2022

Expires on

Does not expire