Learn Docker Security using Interactive Browser-Based Scenarios

By Katacoda

Solve real problems and enhance your skills with browser based hands on labs without any downloads or configuration

Hack ElasticSearch container

Learn how to use application exploits to gain access to a container

Start Scenario

CGroups and Namespaces

Learn how cgroups and namespaces limit what a container can do

Start Scenario

Scan Images for Vulnerabilities with CoreOS Clair

Start Scenario

Introduction to Seccomp

Learn how to use Seccomp to restrict syscalls

Start Scenario

Use No New Privileges flag to restrict additional access

Learn how to restrict applications with correct flags gaining root access

Start Scenario

User Namespaces

Learn how to change root account via user namespaces

Start Scenario

Generate AppArmor profiles using Bane

Learn how Bane can be used to generate AppArmor profiles

Start Scenario

Ignoring Files From Docker Build

Learn how to ignore files being sent to the Docker Build Context or included in an image

Start Scenario

Access .ssh keys during Docker build

Dockito OnVault provides access to .ssh keys without them being stored in the image

Start Scenario

Store Secrets using Hashicorp Vault

Learn how to store and manage secrets using Hashicorp Vault

Start Scenario

Read Vault Secrets from Containers

Learn how to read secrets from Hashicorp Vault from inside Docker Containers using Volume Drivers

Start Scenario
By Sysdig

Container Security Monitoring with Falco

Learn how to use Sysdig Falco to detect anomalous behaviour and create your own container security

Start Scenario

Your Content Here

Add your own content to Katacoda and share your experience or product with the community

Create Content