Kubernetes and Container Security
All certified coursesThis course is intended to equip learners with the knowledge and skills to effectively discover, track, and secure Kubernetes and Containers from build to runtime.
By completing this course, you should be able to meet the following objectives:
Understand Qualys container security and its practical use cases.
Understand how to select appropriate sensors for each stage, deploy them effectively, gain a comprehensive understanding of various security gaps, prioritize these gaps, and implement mitigation strategies.
Agenda
Container Security Overview
Qualys Container Security
Sensors Overview, Deployment and Management
Secure Container Environments at Runtime
Secure the Registry
Secure the Build Pipeline
Vulnerability and Compliance Reporting
Managing Your Container Assets
Risk Prioritization
Remediate and Accept Risk
Hands-on labs or lab simulation will cover the following topics to complement the coursework:
Deploy Sensors at Runtime
Install Sensor using Helm Chart
Install Sensor using DaemonSet-YAML
Install General Sensor on a Docker Host
Discover Kubernetes inventory with Cluster sensor
Admission Control and POD Security: Kubernetes
Secure Images in AWS ECS Fargate
Secure Registry using Registry Sensor (DockerHub)
Secure Registry using QScanner (AWS ECR)
Detect Secrets within Container Images using Registry Sensor (AWS ECR)
Detect Secrets within Container Images using QScanner
QScanner installation and its modes
Automate securing build pipeline using QScanner
SCA Scans
Visibility into Complete Container Environment
Export Container Inventory and Security Gaps Information via Reports
Track Container Security KPIs using Dashboards