Container Security Management Training

Level

Intermediate

Duration

16h / 2 days

Date

Individually arranged

Price

Individually arranged

Container Security Management Training

The intensive, two-day “Container Security Management” training is a practical course for IT specialists, focusing on securing container environments. Participants will gain the knowledge and skills necessary to identify, assess, and minimize risks associated with containerization. The course combines theory with extensive workshops, enabling immediate practical application of the acquired knowledge.

Who is this training for?
  • logo infoshare System administrators and DevOps
  • logo infoshare IT security engineers
  • logo infoshare Cloud solutions architects
  • logo infoshare Developers working with container technologies
  • logo infoshare IT specialists interested in container security

What You Will Learn

  • Identification and minimization of security threats in container environments
  • Implementation of best practices for securing container images and configurations
  • Monitoring and responding to security incidents in real time
  • Integration of security tools with CI/CD processes for containers

Participants:

  • Basic knowledge of Linux systems
  • Experience working with containers (e.g., Docker)
  • Basic knowledge of computer networks
  • Ability to use the command line

Training Program

  1. Day 1

  • Introduction to container security management
  • Architecture and components of container environments
  • Common threats and vulnerabilities in container ecosystems
  • Securing container images

    • Creating secure base images
    • Managing base images
    • Implementing vulnerability scanning in CI/CD pipelines
  • Secure container environment configuration

    • Image registries and access control
    • Network isolation and segmentation
  • Workshop: Container Security Audit

    • Using tools for container security analysis
    • Identifying security gaps
    • Reporting vulnerabilities and risks
  1. Day 2

  • Monitoring and logging in container environments

    • Configuring monitoring systems
    • Log analysis
    • Anomaly detection
  • Secret management in containers

    • Secure storage of secrets
    • Integration with external key management systems
  • Runtime security

    • Configuring container security policies
    • Protection against privilege escalation
  • Workshop: Incident Response in Container Environments

    • Attack simulation
    • Threat detection methods
    • Developing incident response plans

Contact us

we will organize training for you tailored to your needs

Przemysław Wołosz

Key Account Manager

przemyslaw.wolosz@infoShareAcademy.com

    The controller of your personal data is InfoShare Academy Sp. z o.o. with its registered office in Gdańsk, al. Grunwaldzka 427B, 80-309 Gdańsk, KRS: 0000531749, NIP: 5842742213. Personal data are processed in accordance with information clause.