Free Training |

Kubernetes and Container Security

All certified courses

This course is intended to equip learners with the knowledge and skills to effectively discover, track, and secure Kubernetes and Containers from build to runtime.

By completing this course, you should be able to meet the following objectives:

  • Understand Qualys container security and its practical use cases.

  • Understand how to select appropriate sensors for each stage, deploy them effectively, gain a comprehensive understanding of various security gaps, prioritize these gaps, and implement mitigation strategies.

Agenda

  1. Container Security Overview

  2. Qualys Container Security

  3. Sensors Overview, Deployment and Management

  4. Secure Container Environments at Runtime

  5. Secure the Registry

  6. Secure the Build Pipeline

  7. Vulnerability and Compliance Reporting

  8. Managing Your Container Assets

  9. Risk Prioritization

  10. Remediate and Accept Risk

Hands-on labs or lab simulation will cover the following topics to complement the coursework:

  1. Deploy Sensors at Runtime

  2. Install Sensor using Helm Chart

  3. Install Sensor using DaemonSet-YAML

  4. Install General Sensor on a Docker Host

  5. Discover Kubernetes inventory with Cluster sensor

  6. Admission Control and POD Security: Kubernetes

  7. Secure Images in AWS ECS Fargate

  8. Secure Registry using Registry Sensor (DockerHub)

  9. Secure Registry using QScanner (AWS ECR)

  10. Detect Secrets within Container Images using Registry Sensor (AWS ECR)

  11. Detect Secrets within Container Images using QScanner

  12. QScanner installation and its modes

  13. Automate securing build pipeline using QScanner

  14. SCA Scans

  15. Visibility into Complete Container Environment

  16. Export Container Inventory and Security Gaps Information via Reports

  17. Track Container Security KPIs using Dashboards