Pentesting with Docker
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the world of penetration testing using Docker in this 45-minute conference talk from BSidesLV 2015. Dive into Docker's architecture, registry, and practical applications for cybersecurity professionals. Learn how to build custom Docker images, create Dockerfiles, and leverage Docker on OS X. Discover techniques for port forwarding, running handlers, and sharing files and software within Docker containers. Gain insights into running Burp Suite and managing preferences in a containerized environment. Enhance your pentesting toolkit with Docker's powerful containerization capabilities.
Syllabus
Introduction
What is Docker
Why use Docker
Docker Architecture
Docker Registry
Build our own
Build the image
Docker files
Docker on OS X
Docker Port Forwarding
Running Handlers
Sharing Files
Sharing Software
Running Burp
Preferences
Taught by
BSidesLV
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent