Container Security Bootcamp
Course Description:
The Container Security Bootcamp is a hands-on, lab-driven program designed to take learners from foundational container concepts through advanced attack and defense techniques. Over a series of instructor-led sessions and lab exercises, participants explore how misconfigurations in containers, hosts, registries, and orchestration systems can be leveraged by attackers — and learn how to defend against those threats.
What You’ll Learn:
By the end of the bootcamp, participants will be able to:
Understand container fundamentals — architectures, namespaces, cgroups, container runtimes (runc, containerd), images, volumes, networks (Pentester Academy)
Perform security audits of container environments including Docker, registries, and container orchestration tools (Pentester Academy)
Execute and defend against container breakouts arising from privileges, shared namespaces, mounted sockets, and excessive capabilities (Pentester Academy)
Attack Docker hosts via misconfigured sockets, management tools, and insecure settings; explore Docker image vulnerabilities and backdooring (Pentester Academy)
Implement security best practices: namespace remapping, AppArmor / seccomp policies, Dockerfile linting, image vulnerability scanning, secure registry setup, TLS/authentication controls (Pentester Academy)
Investigate container forensics: extract artifacts from images and container layers, detect backdoors, analyze container checkpoints (Pentester Academy Blog)
Prerequisites:
Basic computer and networking understanding
Familiarity with Linux (shell, file system, permissions)
Target Audience:
Security professionals and pentesters who want to add container-level hacking skills
DevSecOps / cloud engineers interested in securing containerized environments
Enthusiasts and beginners who wish to build strong foundations in container security
Why This Bootcamp Matters:
With containers and microservices now core to many modern infrastructure stacks, insecure configurations in container ecosystems are a frequent and severe attack vector. This bootcamp empowers participants to think like attackers — thereby minimizing risk and improving defense posture in production environments.








