인프런 영문 브랜드 로고
인프런 영문 브랜드 로고
Security & Network

/

Computer Security

Understanding Docker Container Infrastructure and Hacking/Security

This training is a hands-on course covering infrastructure construction using Docker container technology, vulnerability analysis, and API web server diagnostics. It is designed to comprehensively learn from the basic concepts of Docker to its application in real-world environments, security vulnerability analysis, and response.

24 students are taking this course

Docker
Penetration Testing
Network
security training

This course is prepared for Basic Learners.

What you will learn!

  • Understanding how to install, configure, and manage Docker containers.

  • Docker-based web server and database operation practice

  • Learning from security vulnerability analysis and response cases in a Docker environment.

"Conquering Container Infrastructure and Security Analysis with Docker"

  • From the basics of Docker containers to practical use: You can learn through hands-on practice how to set up virtual environments, manage Docker images, operate web servers and databases, and automate deployment (Dockerfiles, Docker Compose).

  • Security vulnerability analysis and response technology: Learn vulnerability analysis in a Docker environment, real attack scenarios (web shell injection, reverse connection, port forwarding, etc.), and mock hacking cases of API servers using OWASP crAPI.

I recommend this to these people

People I would like to recommend (1)

From beginners who are new to Docker containers to those who want to use them in practice.
Anyone interested in virtualization technology and container operations.

Anyone thinking about getting a job in the field of mock hacking

People I would like to recommend (2)

Anyone who wants to analyze and respond to security vulnerabilities in a Docker environment.
Anyone who wants to improve the security of web applications such as WordPress.

People I would like to recommend (3)

Anyone interested in building a career in IT infrastructure and DevOps.
Anyone who wants to learn automated deployment and server management techniques using Docker.

After class

  • Ability to build infrastructure through Docker: You can set up a virtual environment and operate web servers and databases using Docker containers.

  • Acquire security analysis and response skills: Analyze vulnerabilities in the Docker environment and develop security response capabilities through real attack scenarios. It is conducted in accordance with the security work process of mock hacking and bug hunting.

  • Practical Application: You can learn practical skills that can be applied immediately in the field, such as automated deployment using Docker Compose, WordPress operation, and API server diagnosis.

Features of this course

Please introduce the key features and differentiating factors.

From the basics of Docker containers to security analysis, all in one place

You will learn through hands-on practice, from Docker installation, web server operation, automated deployment, to vulnerability analysis and response.

Practice-oriented case-based learning

You can learn skills that can be immediately applied in real-world environments, such as WordPress deployment and OWASP crAPI hacking cases.

Learn about these things

  • Main keywords: Docker installation, virtual environment (VirtualBox, Kali Linux), Docker Hub, web server operation, Docker command, network configuration, volume management, Dockerfile, Docker Compose, WordPress deployment, plugin/theme management.

  • Features: Through hands-on training, you can learn web server and database operation and automated deployment techniques using Docker containers.

  • Key words: vulnerability analysis, Wpscan, Metasploit, web shell injection, reverse connection, port forwarding, internal network exploration.

  • Features: Learn how to analyze and respond to security vulnerabilities in a Docker environment through real-world attack scenarios.

Instructor Introduction (CEO Jo Jeong-won)

- Security Project Manager and Representative
- Security consulting and training for over 200 large and small businesses
- (Former) KB Securities IT Planning Information Protection Part
- (Former) A3 Security Simulated Hacking Team
- (Former) Multicampus IT Security External Professional Instructor
- (Former) Visiting Professor, Department of Industrial Security, Chung-Ang University
- (Former) Seoul Digital University Visiting Professor
Book publication
- Android Mobile App Simulated Hacking (Acorn Publishing, 2017)
- Perfect Practice of Web Mock Hacking Using Vibox (Hanbit Media, 2016)
- IT Engineer Two Jobs, Book Review (Bifan Books, 2015)
- Utilizing Buffsuite and Web Simulated Hacking (Hanbit Media, 2015)
- Analysis of WordPress plugin vulnerabilities and simulated hacking (Hanbit Media, 2015)
- How to live as an IT engineer 1 (Bifanbooks, 2015)
- Android Mobile Malware and Simulated Hacking Diagnosis (Acorn Publishing, 2014)
- What is Simulated Hacking (Wikibooks, 2014)
- Simulated Hacking Using Kali Linux (Acorn Publishing, 2014)
- The World of Digital Forensics (Infobooks, 2014)
- Hacker, the Cracker Catcher Detective (Seongandang, 2010)

Published over 30 books

Things to note before taking the class

Practice environment

  • Operating System and Version (OS): Recommended OS environment supported by VirtualBox virtualization in Windows 11 environment.

  • Tools used: VirtualBox (6.1 or later), Kali Linux (latest image), Wpscan, Metasploit Framework, OWASP crAPI installation required (explained in the course)

  • PC specifications: CPU 4 cores or higher, 8GB or more memory, 50GB or more free disk space, virtualization support (VT-x/AMD-V enabled) recommended.

Learning Materials

  • Learning materials provided: Command practice through Notion (some provided only as videos), OWASP crAPI practice guide provided

  • Features and notes on the main lecture, application, and other learning materials: Provides docker files and script files used during the lecture, along with a guide to setting up a practice environment, to enable review and applied learning.

Player Knowledge and Notes

  • Learning Difficulty: Beginner level, requires basic understanding of Linux commands

  • Questions/Answers and future updates: Questions can be asked through the Q&A bulletin board within the lecture platform, and the lecture content will be updated periodically according to updates to Docker and related tools.

Recommended for
these people!

Who is this course right for?

  • Aspiring security experts who want to learn security vulnerability analysis and response techniques.

  • IT infrastructure staff with experience in web server operation and management

  • Beginner developers and system administrators interested in Docker and container technology

Need to know before starting?

  • Basic experience using Linux commands

  • Basic understanding of virtualization technology (e.g., VirtualBox)

  • Basic knowledge of web servers and networking concepts (recommended)

Hello
This is

104,713

Students

2,906

Reviews

430

Answers

4.7

Rating

69

Courses

보안프로젝트 ( www.boanproject.com )는 IT보안, 빅데이터, 머신러닝, IoT 등 다양한 분야의 온라인 강의, 그룹 강의를 진행하고 있습니다. 

Curriculum

All

37 lectures ∙ (8hr 7min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

Not enough reviews.
Become the author of a review that helps everyone!

boanproject's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!