Program Highlights
InfosecTrain’s Container Security Training is an intensive, instructor-led program designed to give learners the practical skills and knowledge they need about container fundamentals, advanced image hardening, and ensure that learners understand essential runtime protection, alongside comprehensive Kubernetes cluster security. Learners won’t just learn theory; they’ll get hands-on with top open-source tools like Trivy, Falco, Notary, and HashiCorp Vault. The training’s focus is on real-world application, teaching learners how to bake security right into your CI/CD pipelines, set up real-time monitoring, and implement best practices for everything from access control and secrets management to incident response.
16-Hour LIVE Instructor-led Training
Covers Open-source Tools
Hands-on Labs
Practical Approach
Certified Experts
Training Completion Certificate
Career Guidance & Mentorship
Post Training Support
Access to Recorded Sessions
Learning Schedule
- upcoming classes
- corporate training
- 1 on 1 training
Looking for a customized training?
REQUEST A BATCHWhy Choose Our Corporate Training Solution
- Upskill your team on the latest tech
- Highly customized solutions
- Free Training Needs Analysis
- Skill-specific training delivery
- Secure your organizations inside-out
Why Choose 1-on-1 Training
- Get personalized attention
- Customized content
- Learn at your dedicated hour
- Instant clarification of doubt
- Guaranteed to run
Can't Find a Suitable Schedule? Talk to Our Training Advisor
This Container Security Training program is a hands-on, expert-led journey into securing containerized applications and infrastructure. Designed for DevOps, Cloud, and Security professionals, the training provides in-depth knowledge and practical skills to identify, mitigate, and respond to container-specific threats. Covering Docker and Kubernetes, the training explores image hardening, runtime protection, orchestration security, and open-source security tools integration into CI/CD pipelines.
Part 1: Introduction to Containers & Container Security Basics
Objective: Understand the fundamentals of containers and the security concerns around them, as well as learn best practices for securing container images, registries, and runtime environments.
Session 1: Introduction to Containers
- Overview of Containers and Virtualization
- Difference between Containers and VMs
- How containers work (Docker as a case study)
- Container Lifecycle
- Image creation, building, running, and stopping containers
- Introduction to Docker and Kubernetes
Hands-on:
- Set up Docker on a local machine
- Build and run a basic container image using Docker
Session 2: Security Concerns in Containers
- Attack Surface of Containers
- Container Image vulnerabilities
- Container runtime vulnerabilities
- Host system vulnerabilities and container isolation
- Privileged containers and root access
- Common Security Risks
- Malicious containers
- Container breakout
- Resource contention
Hands-on:
- Scan a container image for vulnerabilities using Trivy or Clair
- Check Docker security best practices (using docker scan)
Session 3: Container Image Security Best Practices
- Best Practices for Building Secure Container Images
- Minimal base images
- Regular updates and patching
- Use trusted registries (Docker Hub, private registries)
- Container Image Hardening
- Remove unnecessary binaries, dependencies
- Avoid running containers as root
- Signing and verifying container images with Notary
Hands-on:
- Build a secure container image using a minimal base image (e.g., Alpine)
- Push/pull images from a private registry
- Implement image signing and verification with Notary (or use Docker Content Trust)
Session 4: Container Runtime Security
- Securing Docker Daemon
- Use Docker user namespaces for isolation
- Protect the Docker socket and permissions
- Restricting container privileges (use –no-new-privileges, –cap-drop flags)
- Container Isolation Techniques
- Linux namespaces and cgroups
- Seccomp profiles, AppArmor, and SELinux
- Container resource limits and security
- Monitoring Containers with Prometheus and Grafana
Hands-on:
- Set up Docker security features: Use namespaces and cgroups
- Implement Seccomp and AppArmor profiles for containers
- Monitor container performance and security with Prometheus and Grafana
Part 2: Advanced Container Security and Orchestration Security
Objective: Focus on securing container orchestration platforms (like Kubernetes) and implementing runtime security monitoring with open-source tools.
Session 5: Securing Kubernetes Clusters
- Kubernetes Architecture and Components
- Pod, Node, and Cluster level security
- Securing Kubernetes API Server and etcd
- Role-Based Access Control (RBAC)
- Network Policies and Pod Security Policies
- Network Security in Kubernetes
- Secure ingress/egress with Network Policies
- Service Mesh and its role in security (e.g., Istio)
Hands-on:
- Set up a Kubernetes cluster using Minikube or K3s
- Implement RBAC and Pod Security Policies in Kubernetes
- Configure Network Policies for pod communication security
Session 6: Continuous Container Security and Monitoring
- Continuous Container Security Workflow
- CI/CD pipeline integration for container security
- Scanning images at build time with Trivy, Clair, or Anchore
- Runtime monitoring with Falco and Sysdig
- Vulnerability Management
- Patch management strategies
- Automated security scans
Hands-on:
- Integrate image scanning with a CI/CD pipeline (e.g., GitLab CI)
- Set up runtime security monitoring using Falco
- Monitor security events using Sysdig or Falco
Session 7: Incident Response and Best Practices
- Container Intrusion Detection and Incident Response
- Analyzing logs from Docker and Kubernetes
- Forensics and collecting data from container environments
- Responding to container security incidents
- Security Best Practices for Containers
- Immutable infrastructure
- Secrets management (e.g., using HashiCorp Vault or Kubernetes Secrets)
- Using trusted registries and content signing
Hands-on:
- Analyze Docker and Kubernetes logs for security incidents
- Set up and use HashiCorp Vault to manage container secrets
- Implement an incident response playbook using Kubernetes and Docker logs
This training is ideal for:
- DevOps Engineers
- Cloud Engineers
- Security Engineers & Analysts
- System Administrators
- Developers working in containerized environments
- IT professionals preparing for container security certification
- Familiarity with Linux command line
- Basic understanding of virtualization or cloud environments
- Intro-level experience with Docker/Kubernetes (Optional but helpful)
Upon successful completion of the training, participants will be able to:
- Understand the security risks inherent to containers and orchestration platforms
- Harden container images and implement secure CI/CD pipelines
- Secure the Docker and Kubernetes runtime environments
- Monitor and respond to container threats in real-time
- Use tools like Trivy, Falco, Notary, and Vault for layered security
- Apply best practices for access control, secrets management, and system hardening
- Integrate container security throughout the SDLC (Software Development Lifecycle)
- Build a security-first mindset for modern cloud-native environments
-
Docker: Image creation, Docker Hub, Docker scan
-
Trivy and Clair: Container image vulnerability scanning
-
Notary: Image signing and verification
-
Prometheus & Grafana: Monitoring container performance and security metrics
-
Minikube/K3s: Setting up local Kubernetes clusters
-
Falco and Sysdig: Runtime security monitoring and event detection
-
Kubernetes Network Policies, RBAC, Pod Security Policies: Securing Kubernetes clusters
-
HashiCorp Vault: Secrets management for containerized environments
How We Help You Succeed
Vision
Goal
Skill-Building
Mentoring
Direction
Support
Success
Your Trusted Instructors

7+ Years Of Experience
Words Have Power

It was a very good experience with the team. The class was clear and understandable and it benefitted me in learning all the modules and preparing for the exam.

I loved overall training! Trainer is very knowledebale, had clear understaing of all the topics covered. Loved the way he pays attention to details.

I had a great experience with the team. The training advisor was very supportive and the trainer explained the concepts clearly and effectively. The course was well-structured and has definitely enhanced my skills. Thank you for a wonderful learning experience InfosecTrain.

The class was really good. The instructor gave us confidence and delivered the content in an impactful and easy-to-understand manner.

The course helped me understand several domains I was unfamiliar with. The instructor was exceptionally skilled and confident in delivering the content.

The course was well-structured and easy to follow. The instructor’s use of real-life examples made it easier to connect with and understand the concepts.
Success Speaks Volumes
Get a Sample Certificate

Frequently Asked Questions
1. What is Container Security Training?
The Container Security Training is a live, instructor-led program that equips learners with practical skills to secure Docker, Kubernetes, and containerized infrastructure. The training covers container fundamentals, image hardening, runtime protection, and orchestration security, with hands-on labs using tools like Trivy, Falco, Notary, and HashiCorp Vault.
2. Who should take Container Security training?
This training is ideal for:
- DevOps Engineers
- Cloud Engineers
- Security Analysts
- System Administrators
- Developers working with containers
- IT professionals preparing for container security certifications
3. Do I need prior experience with containers?
While prior experience with Docker or Kubernetes is helpful, it is not mandatory. The training starts with foundational container concepts and progressively advances into security practices, making it suitable even for those newer to container technology.
4. What skills will I gain from Container Security training?
You will learn to:
- Secure Docker and Kubernetes environments
- Harden container images and registries
- Integrate security into CI/CD pipelines
- Use tools like Trivy, Falco, Notary, Sysdig, and Vault
- Apply access controls, secrets management, and runtime protections
- Implement incident response for container threats
5. Is Container Security training beginner-friendly?
Yes. It is beginner-friendly for those with a basic understanding of Linux and some familiarity with cloud or virtualization concepts. The training builds from fundamentals to advanced security topics, supported by hands-on labs.
6. Is a certificate provided after completion?
Yes. Upon successful completion of the training, you will receive a Training Completion Certificate from InfosecTrain.
7. What tools and technologies are covered?
The training includes hands-on experience with:
- Docker – Container basics, image management
- Kubernetes (Minikube/K3s) – Orchestration and cluster security
- Trivy, Clair – Vulnerability scanning
- Notary – Image signing and verification
- Falco, Sysdig – Runtime security monitoring
- HashiCorp Vault – Secrets management
- Prometheus & Grafana – Monitoring and metrics
8. Is Container Security a live instructor-led or self-paced training?
The training is primarily live instructor-led, featuring 16 hours of interactive sessions. Learners also receive access to recorded sessions for review at their own pace.
9. Are there any hands-on labs included?
Yes. The training includes extensive hands-on labs where you’ll build, scan, harden, and monitor container environments using real-world tools and scenarios.
10. How will Container Security training help my career?
This training:
- Enhances your ability to secure modern, cloud-native applications
- Aligns with industry standards for DevSecOps and CI/CD security
- Equips you with practical, job-ready skills and tools
- Strengthens your qualifications for roles in cloud security, DevOps, and container engineering
- Provides access to career guidance and mentorship post-training