RCCE Course
Course #334

Containers for Beginners

📊 Level: Beginner
⏱️ Duration: 2 Days
🏷️ Track: DevSecOps
📋 Prerequisites: None
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn container security including Docker security configurations, container image scanning, runtime protection, orchestrator security, container networking, and container forensics. RCCE students will learn to build secure container images following minimal base image and multi-stage build practices, scan images for vulnerabilities and misconfigurations, implement container runtime security using seccomp, AppArmor, and SELinux profiles, configure Docker daemon security, isolate container workloads, monitor container behavior for anomalies, investigate compromised containers, and establish container security governance across development and operations teams. Designed for students with no prior experience in this area, this course builds knowledge from the ground up with clear explanations, guided demonstrations, and progressive skill-building. Starting from foundational concepts, RCCE students will learn core concepts through practical examples that connect theory to real-world security operations. By completion, students will have the foundational knowledge and hands-on confidence needed to contribute in professional cybersecurity roles.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Containers for Beginners
🧠 What You Will Learn
  • Explain Course Overview fundamentals
  • Execute hands-on tasks for container fundamentals
  • Execute hands-on tasks for runtime protection — covering Building Secure Images.
  • Execute hands-on tasks for what are containers?
  • Execute hands-on tasks for container definition — covering Lightweight isolated execution environments.
  • Execute hands-on tasks for containers vs virtual machines — covering Lightweight isolated execution environments.
  • Execute hands-on tasks for immutable infrastructure — covering Replace, never patch, Consistent deployments.
  • Execute hands-on tasks for isolation boundaries — covering Namespace separation per.
  • Execute hands-on tasks for rapid recovery — covering Seconds to redeploy clean.
  • Explain Docker Architecture Overview fundamentals
  • Execute hands-on tasks for docker client
  • Execute hands-on tasks for linux kernel — covering Namespaces for isolation.
📚 Course Outline
Module 01Course Overview
Module 02Container Fundamentals
Module 03Runtime Protection
Module 04What Are Containers?
Module 05Container Definition
Module 06Containers vs Virtual Machines
Module 07Immutable Infrastructure
Module 08Isolation Boundaries
Module 09Rapid Recovery
Module 10Docker Architecture Overview
Module 11Docker Client
Module 12Linux Kernel
Module 13Container Isolation Primitives
Module 14Default Docker profile exists
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice containers for beginners by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Explain Course Overview fundamentals
  • Lab 2: Execute hands-on tasks for container fundamentals
  • Lab 3: Execute hands-on tasks for runtime protection
  • Lab 4: Execute hands-on tasks for what are containers?
  • Lab 5: Execute hands-on tasks for container definition
📊 Skill Level
Beginner
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Containers for Beginners, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI