Talk to an Instructor:
Jonas Felix
Security of Containers and Kubernetes based systems can easily get out of hand. eBPF is a technology that allows us to quasi X-ray our entire infrastructure and applications.
This course will show you how to drastically simplify your security maintainence by combining observability, network, performance and security eBPF tools. So that neither attackers nor vendors can hide from you.
We are happy to conduct tailored courses for your team - on-site, remotely or in our course rooms.
The main objective of this course is to empower you to find what matters fast. From understanding the basic 8 attack classes to fighting alert-fatigue with anomalies and automating as much as possible. My goal is to give you tools and techniques to become Cyber-Resilient on Kubernetes.
What to look for:
- Container Primitives DeepDive: security starts here
- Break Down the Attack Classes of containerized systems on Linux:
... - Container Escapes
... - Insecure Volumes and Mounts
... - Abuse of Capabilities
... - Pivots over Sockets
... - Roles and Identities (RBAC) abuse
... - Token Impersonation
... - Misc
- Different approaches to effective threat modelling (mini Workshop)
How to find it:
- Zero Days and the power of anomaly detection (Inspector Gadget)
- Making Network policies secure-by-default
- How to keep all your rules uptodate (Bill of Behavior)
- EU CRA: I have 24 hrs to detect a Breach -> how to achieve this?
- Making threats observable with CNCF Pixie and Kubescape:
... - Find vulnerable libraries
... - How to inspect the memory (using CRIU)
... - How to introspect SSL traffic
... - How to identify data exfiltration
How to fix it:
- Building Container Images: how to measure true quality
- Dos and Donts in CI-CD Design
- Forensic Storage vs PII compliance: what to avoid
- Audit yourself: continuous hardening via automation
... - Block vulnerable code from executing
- Control Loop Decoupling and Breach Containment (Theory)
- Making Network policies secure-by-default
- How to keep all your rules uptodate (Bill of Behavior)
- Optional: Identity federation, Linux Security Modules, "CVE of the day"
- Optional: Discretionary Access Control
The concepts you will learn apply across most container based system running on Linux and are cloud agnostic. Some highlighted CVEs may affect only certain providers.
Kernel knowledge is NOT required, solid Linux knowledge is required.
The entire course is hosted in live hands-on labs: get a taste right now https://labs.iximiuz.com/courses/discoverebpf-0d7c6c54
Disclaimer: The actual course content may vary from the above, depending on the trainer, implementation, duration and constellation of participants.
Whether we call it training, course, workshop or seminar, we want to pick up participants at their point and equip them with the necessary practical knowledge so that they can apply the technology directly after the training and deepen it independently.
Defend your Kubernetes efficiently, protect your mental health, leverage the magic of eBPF
Through a balanced mixture of theory and practice, our experienced trainer guides the participants through the various topics, accompanied by live demonstrations and practical exercises to deepen understanding.
Software or system engineers , security engineers, CISOs
Solid Linux knowledge is required and Kubernetes basics are very helpful. Reasonable basic experience with OpenSource, DevOps and IT Security basics are highly desireable.
You do NOT require Kernel knowledge.
Every participant will receive a questionnaire and a preparation checklist after registration. We provide a comprehensive laboratory environment for each participant, so that all participants can directly implement their own experiments and even complex scenarios.
Thank you for your request, we will get back to you as soon as possible.
Unexpected error - please contact us by E-Mail or Phone.
Sign up for the waiting list for more public course dates. Once we have enough people on the waiting list, we will determine a date that suits everyone as much as possible and schedule a new session. If you want to participate directly with two colleagues, we can even plan a public course specifically for you.
Thank you for your request, we will get back to you as soon as possible.
Unexpected error - please contact us by E-Mail or Phone.
eBPF (extended Berkeley Packet Filter) has its roots in the classic Berkeley Packet Filter (BPF), which was created in the early 1990s to efficiently filter network packets. The modern eBPF was a significant redesign led by Alexei Starovoitov and was merged into the Linux kernel in 2014.
The "extended" part is key: eBPF evolved from a simple packet filter into a general-purpose, event-driven virtual machine inside the Linux kernel. It allows sandboxed programs to be attached to various kernel hooks (syscalls, network events, tracepoints) to safely and efficiently extend kernel capabilities without changing kernel source code or loading kernel modules.
This programmability has made eBPF the foundation for a new generation of high-performance networking, observability, and security tools in the cloud-native ecosystem, including projects like Cilium, Falco, Pixie and Kubescape. It is now governed by the eBPF Foundation under the Linux Foundation.
Talk to an Instructor:
Jonas Felix
Training-Centers:
Basel:
- Aeschenplatz 6, 4052 Basel
Zurich:
- HWZ, Lagerstrasse 5, 8004 Zürich
Company address:
felixideas GmbH
Baslerstrasse 5a
4102 Binningen