facebook
Practical DevSecOps - Hands-on DevSecOps Certification and Training.

Trusted by 10,000+ Learners

Certified Container Security ExpertTM

Become a Container Security Expert. From Container fundamentals to advanced defense tactics, learn to identify, exploit, and protect containerized apps in real-world scenarios. 87% of learners report improved security posture within 2 months. 
Our Container Security Experts are used by 8 of 10 Fortune 500 tech companies.

Monitor iconSelf-paced learning

Globe iconBrowser based lab access

Headset icon24/7 Instructor support

Monitor iconSelf-paced learning mode

Globe iconBrowser based lab access

Headset icon24/7 Instructor support

Monitor iconSelf-paced learning mode

Globe iconBrowser based lab access

Headset icon24/7 Instructor support

Video thumbnail

Trusted by top companies across industries, empowering thousands of professionals worldwide. Join the ranks of security leaders

Course Chapters

Loading chapters...

Prerequisites

  1. Course participants should have knowledge of running basic Linux commands like ls, cd, mkdir, etc.,

Chapter 1: Introduction to Containers

  1. What is a container?
  2. Basics of a container and its challenge
  3. Container vs. Virtualization
    1. Container Advantages
    2. Container Disadvantages
  4. Container fundamentals
    1. Namespaces
    2. Cgroup
    3. Capabilities
  5. Docker architecture and its components
    1. Docker CLI
    2. Docker Engine (Daemon, API)
    3. Docker Runtime (containerd, shim, runc)
  6. Interacting with container ecosystem
    1. Docker images and image layers
    2. Build Container images using Dockerfile
    3. Docker image repository
    4. Running a container
  7. Managing / Orchestrating multiple containers
    1. Using CLI/API to manage multiple containers
    2. Docker Compose
    3. Docker Swarm
    4. Kubernetes
  8. Docker alternatives
    1. Podman
    2. CRI-O
  9. Hands-on Exercises:
    1. Working With Docker Command
    2. Docker Networking
    3. Manage Data in Docker
    4. Create Docker Image using Dockerfile
    5. Writing Dockerfile
    6. How To Use Container Registry
    7. Learn Docker Compose
    8. Working With Docker SDK
    9. Creating Container Snapshots

Chapter 2: Container Reconnaissance

  1. Overview of Container Security
  2. Attack surface of the container ecosystem
  3. Identifying the components and their security state
    1. Get an inventory of containers
      1. Docker Images
      2. Dockerfile and Environment variables
      3. Docker volumes
      4. Docker Networking
      5. Ports used/Port forwarding
      6. Docker Registries
    2. Exhaustive review of Namespaces, cgroups and capabilities
  4. Analysis of the attack surface
    1. Using native tools
    2. Using third-party tools
    1. Hands-on Exercises:
      1. Using Built-in Docker Tools for Reconnaissance
      2. Use Third-party Tools for Image Inspection
      3. Scanning the Remote Host for Unauthenticated Docker API Access
      4. Identify a Container and Extract Sensitive Information
      5. Create and Restore a Snapshot of the Container for Further Analysis

    Chapter 3: Attacking Containers and Containerized Apps

    Note: Every topic/sub topic has an exercise in this module

    1. Containers Attack Matrix
    2. Image-based attacks
      1. Malicious Images
      2. Extracting passwords, tokens, TLS certs, etc.
      3. Exploiting vulnerable components
    3. Registry-based attacks
      1. Insecure Docker registries
      2. Open Docker registries
      3. Lack of authorization (RBAC)
    4. Container-based attacks
      1. Manipulating the Privileged mode containers
      2. Attacking mounted docker volumes
      3. Abusing SetUID/SetGID binaries
      4. Exploiting shared namespaces
      5. Attacking Linux capabilities
    5. Docker host (Daemon) / kernel attacks
      1. Exploiting unauthenticated Docker API
      2. Insecure Docker endpoint
      3. Lack of network segregation
      4. Denial of service attacks
      5. Kernel exploits
    6. Privilege escalation methods in Docker
      1. Security misconfigurations
        1. Attacking management tools (Portainer)
        2. Exploiting OWASP Top 10 issues in containerized apps
    7. Hands-on Exercises:
      1. Backdooring Docker Image
      2. Inspecting Docker Daemon Activity
      3. Malicious Container Image
      4. Exploiting Containerized Apps
      5. Unsecured Docker Daemon
      6. Docker Exploitation using deepce
      7. Attacking Misconfigured Docker Registry

    Chapter 4: Defending Containers and Containerized Apps on Scale

    1. Container image security
      1. Building secure container images
        1. Choosing base images
        2. Distroless images
        3. Scratch images
      2. Security Linting of Dockerfiles
      3. Static Analysis(SCA) of container images
      4. Scan for vulnerabilities in container
        1. Choosing the right container scanner tool for your needs
    2. Docker Daemon security configurations
      1. Docker user remapping
      2. Docker runtime security (gVisor, Kata)
      3. Docker socket configuration
        1. fd
        2. TCP socket
        3. TLS authentication
      4. Dynamic Analysis of the container hosts and daemons
    3. Docker host security configurations
      1. Kernel Hardening using Seccomp and AppArmor
      2. Custom policy creation using Seccomp and AppArmor
    4. Network Security in containers
      1. Segregating networks
    5. Misc Docker Security Configurations
      1. Content Trust and Integrity checks
    6. Docker Registry security configurations
      1. Private vs. Public Registries
      2. Authentication and Authorization (RBAC)
      3. Built-in Image scanning capabilities
      4. Policy enforcement
      5. DevOps CI/CD Integration
    7. Docker Tools, Techniques and Tactics
      1. Tools
        1. Dive (Forensic)
        2. Dockle
      2. Techniques
      3. Tactics
    8. Hands-On Exercises:
      1. Static Analysis using Hadolint
      2. Scanning Docker for Vulnerabilities With Trivy
      3. Embedding Trivy Scanning in GitLab CI
      4. Build a Secure, Miniature Image With Distroless To Minimize Attack Footprint
      5. Minimize Docker Security Misconfigurations With CIS Compliance
      6. Securing Container Images by Default Using Harbor
      7. Signing Container Images for Trust

    Chapter 5: Security Monitoring of Containers

    1. Monitoring Docker events, logs
    2. Incident response in containers
    3. Docker runtime prevention
    4. Policy creation, enforcement, and management
      1. Docker security monitoring using Wazuh
      2. Hands-On Exercises:
        1. Auditing Docker using AuditD
        2. Sysdig Falco – Runtime Protection and Monitoring
        3. Tracee – Runtime Security

      Practical DevSecOps Certification Process

      1. After completing the course, you can schedule the CCSE exam on your preferred date.
      2. Process of achieving Practical DevSecOps CCSE Certification can be found on the exam and certification page.

        Become a Container Security Expert in 60 Days

        CCSE-image

        What you’ll learn from the
        Certified Container Security Expert Course?

        Container Fundamentals

        • Build and manage Docker containers and images
        • Configure container registries securely
        • Practice with hands-on live environments

        Attack Surface Analysis

        • Identify risks in Docker components and volumes
        • Analyze container networks and registries
        • Use native and third-party security tools

        Container Attack Techniques

        • Execute image backdooring and registry exploits
        • Perform privilege escalation attacks
        • Test Docker daemon security vulnerabilities

        Container Defense Implementation

        • Build secure container images from scratch
        • Apply Seccomp and AppArmor hardening
        • Integrate vulnerability scanning in CI/CD

        Security Monitoring Systems

        • Configure Sysdig Falco and Tracee for runtime monitoring
        • Implement Wazuh for incident detection
        • Respond to container security incidents

        Damage Control Strategies

        • Apply container isolation techniques
        • Implement network segmentation controls
        • Build defense-in-depth for containerized applications

        We have provided training and presented at numerous industry events.

        blackhat
        owasp
        besides
        brucon
        HITB_Logo 1

        Benefits of Enrolling in the Practical DevSecOps Courses

        Master today’s security challenges with our updated curriculum and hands-on labs, preparing you for real-world threats.

        Browser-based lab

        Access all tools and exercise directly in your browser. Enjoy a practical, hassle-free learning experience - no downloads or installations needed!

        Explore commands with our new AI-Powered 'Explain to me' feature

        Gain detailed insights into any command with our AI-powered feature, designed to enhance your understanding and accelerate your learning.

        Master cutting-edge tools

        Enhance your security skills through hands-on experience with the latest industry tools in our labs. Get equipped for real-world applications and stay ahead of industry changes.

        Become a Container Security Expert in 60 Days

        Hear from our learners

        Explore the global impact of our Practical DevSecOps Certifications through our learners’ testimonials.

        ★★★★★

        I’ve been fascinated with container technologies and always wanted to learn more about them, especially how to secure them.

        Thanks to this great certification from Practical DevSecOps, I learned about the tools,…

        Akshay Sharma
        Akshay Sharma
        Certified DevSecOps, Secure…

        ★★★★★

        ¡Gracias a Practical DevSecOps y a todos los que me acompañaron durante este trayecto! Siempre quise aprender más sobre contenedores y cómo aplicar seguridad en ellos de manera adecuada.

        Después de tomar el examen práctico, el día…

        Eimy Rodríguez
        Eimy Rodríguez
        🛡️Cybersecurity Staff Manager…

        ★★★★★

        What a day to receive this certification….. just 1 week before the hashtag#kubecon2024 Paris event….

        Thrilled to announce that I’ve successfully cleared the Certified Container Security Expert…

        Juhi Singh
        Juhi Singh
        Manager Information Security @ ad…

        ★★★★★

        Very interesting course and tough exam made by Practical DevSecOps.

        I really liked the quality of the content and definitely recommend it to anyone interested in container security…

        Jean-Benjamin
        Jean-Benjamin R.
        Application Security Manager

        ★★★★★

        I’m happy to share that I’ve obtained a new certification: Certified Container Security Expert (CCSE) from Practical DevSecOps!

        This certification and associated training provided hands-on/practical examples that I…

        Gregory East
        Gregory East
        Cloud Security Engineer | DevOps…

        ★★★★★

        After a 6 hour practical exam and follow-up report, happy to announce that I have successfully completed this course on Container Security.

        As containers become more common, knowing how they can be exploited and how to…

        Luke Chatelain
        Luke Chatelain
        Trustpilot Review

        ★★★★★

        I’m excited to share that I’ve earned the Certified Container Security Expert certification from Practical DevSecOps

        This course helped sharpen my container security skills, focusing on key areas like co…

        Kenechukwu Ojiteli
        Kenechukwu Ojiteli
        DevOps Engineer | Kubernetes…

        ★★★★★

        I finally got my hashtag#PracticalDevSecOps Certified Cloud Native Security Expert (CCNSE).

        It was a very nice experience folks at hashtag#PracticalDevSecOps specially @Raja Shekar go above and beyond so…

         Marcos Martín
        Marcos Martín Gutiérrez
        Cybersecurity Engineer | Master‘s…

        ★★★★★

        I am currently working as a working student at an IT company, so I am a beginner in this field.

        I appreciated that the Practical DevSecOps team delivered on their promises, particularly that the CCSE training and exam are suitable…

        Said Schamsadov
        Said Schamsadov
        Trustpilot Review

        ★★★★★

        The CCSE course from Practical DevSecOps was a truly positive experience, especially considering my extensive 15 years in IT and Security, and the numerous courses I’ve attended.

        It stands out as one of the best in terms…

        Djordje Dosic
        Djordje Dosic
        Trustpilot Review

        ★★★★★

        Thrilled to share that I’ve officially earned the Certified Container Security Expert certification!

        This journey has deepened my understanding of container security principles and best practices, and I’m excited to apply these insights…

        Emanuele Fabi
        Emanuele Fabi
        Digital Identity Enthusiast | Certified…

        ★★★★★

        I recently completed my CCSE certification from Practical DevSecOps, and it was a fantastic experience.

        The course content is well-structured and highly engaging. I really appreciated…

        Arun Prasad
        Arun Prasad K
        Trustpilot Review

        Frequently asked questions

        What are the prerequisites required before enrolling in the Container Security Certification Course?

        Basic Linux command knowledge is required before enrolling in this course.

        What’s included in the Container Security Certification Course package?

        Your package includes 3-year access to all course videos, 30-day access to browser-based labs, a comprehensive PDF manual, 24/7 technical support, and one certification exam attempt.

        Do the Labs for the Container Security Certification Course Start Immediately after enrollment?

        No, After enrollment, you’ll select your preferred start date. Your course access begins on your chosen date rather than automatically after purchase.

        Does the Container Security Certification Course come with CPE points?

        Yes, the Container security course gives you 24 CPE points.

        What is the Exam Format for the Container Security Certification Course?
        The exam consists of 5 practical challenges to be completed within 6 hours, followed by a 24-hour window to prepare and submit your exam report. For more information, visit this link.
        Should I go to an exam center, or is the exam online?

        Yes, The exam is entirely online, allowing you to complete it from your home or office.

        How long is the Container Security certification valid?

        The Container Security Expert Certification is a lifetime credential with no renewal requirements.

        What Career Boost Does the Certified Container Security Expert Course Provide?

        The CCSE certification transforms your career trajectory from tactical implementer to trusted security leader. While uncertified professionals in container security typically earn $75,000–$90,000, CCSE-certified experts command $152,000–$160,000, with senior roles exceeding $200,000.

        This dramatic salary increase reflects the market reality: container security is exploding from $2.4 billion in 2024 to $25.5 billion by the mid-2030s (26.5% CAGR), creating massive demand for certified experts. DevOps engineers, cloud architects, and Kubernetes administrators who complete CCSE gain the proven expertise that companies desperately need.

        Beyond compensation, CCSE certification elevates your professional standing—you’ll report to senior leadership, influence critical security decisions, and be recognized as an indispensable strategic asset rather than just another technical resource. In a rapidly growing market, CCSE positions you to capture the premium opportunities while others remain stuck in entry-level roles.

        Why Certified Container Security Expert Course from Practical DevSecOps?

        The Container Security Expert Training from Practical DevSecOps offers several compelling advantages:

        Comprehensive curriculum: The course covers the complete container security lifecycle – from fundamentals to advanced monitoring and defense strategies. You’ll gain expertise in all aspects of container security.

        Practical, hands-on approach: Each chapter includes multiple hands-on exercises that reinforce theoretical concepts with real-world applications. You’ll work directly with tools like Docker, Trivy, Falco, and more.

        Both offensive and defensive skills: The training doesn’t just teach you how to defend – it also shows you how attackers think. You’ll learn attack techniques (chapter 3) and then how to defend against them (chapter 4).

        Industry-relevant tools: The curriculum incorporates widely used security tools in the container ecosystem, preparing you to work with technologies actually used in enterprise environments.

        Scalable security knowledge: The course progresses from single container security to managing security at scale, making it valuable whether you work with small deployments or large container orchestration systems.

        If you’re looking to build specialized security skills in containerization – an increasingly critical area of modern infrastructure – this curriculum appears to provide both depth and breadth of knowledge with a strong emphasis on practical application.

        Unmatched practical focus

        70% hands-on labs for Mastering real-world scenario’s.

        Expert-crafted curriculum

        Get real-world insights from the experienced Security Experts.

        Practical exam

        Take a 6-hour examination to show what you have learned.

        24/7 expert support

        Unbeatable guidance throughout your learning journey.
        future-proof-sec-img2

        Future-Proof Your Career with Container Security Expert Training

        Unlock your potential with Software Supply Chain Security Training! Our Certified Software Supply Chain Security Expert Course equips you with job-ready skills. Conquer the 6-hour exam with confidence and open doors to exciting opportunities and Challenges.