Containers for Beginners
RCCE students will learn container security including Docker security configurations, container image scanning, runtime protection, orchestrator security, container networking, and container forensics. RCCE students will learn to build secure container images following minimal base image and multi-stage build practices, scan images for vulnerabilities and misconfigurations, implement container runtime security using seccomp, AppArmor, and SELinux profiles, configure Docker daemon security, isolate container workloads, monitor container behavior for anomalies, investigate compromised containers, and establish container security governance across development and operations teams. Designed for students with no prior experience in this area, this course builds knowledge from the ground up with clear explanations, guided demonstrations, and progressive skill-building. Starting from foundational concepts, RCCE students will learn core concepts through practical examples that connect theory to real-world security operations. By completion, students will have the foundational knowledge and hands-on confidence needed to contribute in professional cybersecurity roles.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Containers for Beginners
- Explain Course Overview fundamentals
- Execute hands-on tasks for container fundamentals
- Execute hands-on tasks for runtime protection — covering Building Secure Images.
- Execute hands-on tasks for what are containers?
- Execute hands-on tasks for container definition — covering Lightweight isolated execution environments.
- Execute hands-on tasks for containers vs virtual machines — covering Lightweight isolated execution environments.
- Execute hands-on tasks for immutable infrastructure — covering Replace, never patch, Consistent deployments.
- Execute hands-on tasks for isolation boundaries — covering Namespace separation per.
- Execute hands-on tasks for rapid recovery — covering Seconds to redeploy clean.
- Explain Docker Architecture Overview fundamentals
- Execute hands-on tasks for docker client
- Execute hands-on tasks for linux kernel — covering Namespaces for isolation.
| Module 01 | Course Overview |
| Module 02 | Container Fundamentals |
| Module 03 | Runtime Protection |
| Module 04 | What Are Containers? |
| Module 05 | Container Definition |
| Module 06 | Containers vs Virtual Machines |
| Module 07 | Immutable Infrastructure |
| Module 08 | Isolation Boundaries |
| Module 09 | Rapid Recovery |
| Module 10 | Docker Architecture Overview |
| Module 11 | Docker Client |
| Module 12 | Linux Kernel |
| Module 13 | Container Isolation Primitives |
| Module 14 | Default Docker profile exists |
All hands-on labs run on Rocheston Rose X OS. Students practice containers for beginners by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Explain Course Overview fundamentals
- Lab 2: Execute hands-on tasks for container fundamentals
- Lab 3: Execute hands-on tasks for runtime protection
- Lab 4: Execute hands-on tasks for what are containers?
- Lab 5: Execute hands-on tasks for container definition
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Containers for Beginners, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI