Talk to an Instructor:
Jonas Felix
Security of Containers and Kubernetes based systems can easily get out of hand. eBPF is a technology that allows us to quasi X-ray our entire infrastructure and applications.
This course will show you how to drastically
simplify your security maintainence by combining observability, network, performance and security eBPF tools. So that neither attackers nor vendors can hide from you.
We are happy to conduct tailored courses for your team - on-site, remotely or in our course rooms.
The main objective of this course is to empower you to find what matters fast. From understanding the basic 8 attack classes to fighting alert-fatigue with anomalies and automating as much as possible
- Container Primitives DeepDive: security starts here
- Building Container Images: how to measure true quality
- Break Down the Attack Classes of containerized systems on Linux:
... - Container Escapes
... - Volumes
... - Capabilities
... - Sockets
... - Roles and Identities
... - Token Impersonation
... - Misc
- Different approaches to effective threat modelling
- Zero Days and the power of anomaly detection
- Making Network policies secure-by-default
- How to keep all your rules uptodate
- Control Loop Decoupling and Breach Containment
- EU CRA: I have 24 hrs to detect a Breach -> how to achieve this?
- Making threats observable:
... - Find vulnerable libraries
... - Block vulnerable code from executing
... - How to inspect the memory
... - How to introspect SSL traffic
... - How to identify data exfiltration
- Forensic Storage vs PII compliance: what to avoid
- Audit yourself: continuous hardening via automation
- Optional: Identity federation, Linux Security Modules, "CVE of the day"
The concepts you will learn apply across most container based system running on Linux and are cloud agnostic. Some highlighted CVEs may affect only certain providers.
Kernel knowledge is NOT required, solid Linux knowledge is required.
The entire course is hosted in live hands-on labs: get a taste right now https://labs.iximiuz.com/courses/discoverebpf-0d7c6c54
Disclaimer: The actual course content may vary from the above, depending on the trainer, implementation, duration and constellation of participants.
Whether we call it training, course, workshop or seminar, we want to pick up participants at their point and equip them with the necessary practical knowledge so that they can apply the technology directly after the training and deepen it independently.
Defend your Kubernetes efficiently, protect your mental health, leverage the magic of eBPF
Through a balanced mixture of theory and practice, our experienced trainer guides the participants through the various topics, accompanied by live demonstrations and practical exercises to deepen understanding.
Software or system engineers , security engineers, CISOs
This course is not suitable for beginners. Solid Linux knowledge is required. Kubernetes basics are very helpful. Knowledge of scripting languages and bash are required.
Every participant will receive a questionnaire and a preparation checklist after registration. We provide a comprehensive laboratory environment for each participant, so that all participants can directly implement their own experiments and even complex scenarios.
Thank you for your request, we will get back to you as soon as possible.
Unexpected error - please contact us by E-Mail or Phone.
Sign up for the waiting list for more public course dates. Once we have enough people on the waiting list, we will determine a date that suits everyone as much as possible and schedule a new session. If you want to participate directly with two colleagues, we can even plan a public course specifically for you.
Thank you for your request, we will get back to you as soon as possible.
Unexpected error - please contact us by E-Mail or Phone.
eBPF (extended Berkeley Packet Filter) has its roots in the classic Berkeley Packet Filter (BPF), which was created in the early 1990s to efficiently filter network packets. The modern eBPF was a significant redesign led by Alexei Starovoitov and was merged into the Linux kernel in 2014.
The "extended" part is key: eBPF evolved from a simple packet filter into a general-purpose, event-driven virtual machine inside the Linux kernel. It allows sandboxed programs to be attached to various kernel hooks (syscalls, network events, tracepoints) to safely and efficiently extend kernel capabilities without changing kernel source code or loading kernel modules.
This programmability has made eBPF the foundation for a new generation of high-performance networking, observability, and security tools in the cloud-native ecosystem, including projects like Cilium, Falco, Pixie and Kubescape. It is now governed by the eBPF Foundation under the Linux Foundation.
Talk to an Instructor:
Jonas Felix
Training-Centers:
Basel:
- Aeschenplatz 6, 4052 Basel
Zurich:
- HWZ, Lagerstrasse 5, 8004 Zürich
Company address:
felixideas GmbH
Baslerstrasse 5a
4102 Binningen