We may earn an affiliate commission when you visit our partners.
Udacity logo

Microservices Security

Justin Lee, Nick Reva, Katie Gamanji, and Jay Smith
Learn how to harden a Docker and Kubernetes microservices architecture. In this course, you will learn STRIDE to threat model, Docker, and Kubernetes attack surface and be introduced to industry open-source tools such as Docker-bench and Kube-bench to...
Read more
Learn how to harden a Docker and Kubernetes microservices architecture. In this course, you will learn STRIDE to threat model, Docker, and Kubernetes attack surface and be introduced to industry open-source tools such as Docker-bench and Kube-bench to evaluate and harden Docker and Kubernetes weaknesses.

What's inside

Syllabus

In this lesson, we will cover foundational topics such as the importance of microservices security, how it differs from traditional infrastructure security, its history, and stakeholders.
Read more
In this lesson, we will cover the fundamentals of the STRIDE framework and apply STRIDE to Docker and Kubernetes threat modeling.
We will discuss how to protect Docker attack surfaces. We will harden the Docker environment hands-on via Docker-bench, the CIS Docker Benchmark, and Docker content trust.
We will discuss how to protect Kubernetes attack surfaces. We will secure an RKE cluster hands-on via Kube-bench, the CIS Kubernetes Benchmark, and Rancher RKE baseline hardening.
We will cover the characteristics of open-source software that may lead to security issues. We will conduct image layer analysis to patch library and application code vulnerabilities.
We will discuss the importance of monitoring security events at runtime, implement Sysdig Falco for runtime monitoring and Grafana for visualization, and create a security response playbook.
You will build a secure Microservice environment, threat model the Docker and Kubernetes environment, harden a Python Flask application, and implement runtime monitoring.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops microservices security expertise, as it is an increasingly important and popular security method
Taught by Justin Lee, Nick Reva, Katie Gamanji, and Jay Smith, who are recognized industry experts in this field
Examines Docker and Kubernetes, which are highly relevant topics in industry and research
Offers hands-on labs and interactive materials, promoting practical skills
Builds a strong foundation for beginners and strengthens an existing foundation for intermediate learners
Covers unique perspectives and ideas that add color to other topics and subjects

Save this course

Save Microservices Security to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Microservices Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Microservices Security will develop knowledge and skills that may be useful to these careers:
DevOps Engineer
DevOps Engineers use techniques such as threat modeling to improve the security of their software development lifecycle. Taking this course can help you develop threat modeling skills. The course also covers how to implement tools such as Docker-bench to identify and mitigate vulnerabilities in your software. This knowledge would be valuable to a DevOps Engineer.
Network Engineer
Network Engineers are responsible for the design and maintenance of computer networks. This course can help you develop the skills you need to secure Docker and Kubernetes environments, which rely on networking to function properly. The course covers threat modeling, vulnerability assessment, and runtime monitoring, all of which are important skills for a Network Engineer. Taking this course can help you build a foundation in network security and prepare you for a career as a Network Engineer.
Systems Administrator
Systems Administrators are responsible for the maintenance and security of computer systems. This course can help you develop the skills you need to secure Docker and Kubernetes environments, which are commonly used to deploy and manage software applications. The course covers threat modeling, vulnerability assessment, and runtime monitoring, all of which are important skills for a Systems Administrator. Taking this course can help you build a foundation in systems administration and prepare you for a career as a Systems Administrator.
Software Developer
Software Developers are responsible for developing software applications. This course can help you develop the skills you need to develop secure software applications. The course covers threat modeling, vulnerability assessment, and runtime monitoring, all of which are important skills for a Software Developer. Taking this course can help you build a foundation in software security and prepare you for a career as a Software Developer.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for identifying and mitigating security risks. This course can help you develop the skills you need to conduct threat modeling and vulnerability assessments. The course also covers runtime monitoring, which is important for detecting and responding to security incidents. This course can help you build a foundation in cybersecurity and prepare you for a career as a Cybersecurity Analyst.
Security Consultant
Security Consultants help organizations to improve their security posture. This course can help you develop the skills you need to conduct security assessments, develop security plans, and implement security solutions. The course covers threat modeling, vulnerability assessment, and runtime monitoring, all of which are important skills for a Security Consultant. Taking this course can help you build a foundation in security consulting and prepare you for a career as a Security Consultant.
Cloud Security Engineer
Cloud Security Engineers are responsible for the security of cloud-based systems. This course can help you develop the skills you need to secure Docker and Kubernetes environments, which are commonly used in cloud computing. The course covers threat modeling, vulnerability assessment, and runtime monitoring, all of which are important skills for a Cloud Security Engineer.
Security Architect
Security Architects design and implement security solutions for organizations. This course can help you develop the skills you need to design secure Docker and Kubernetes environments. The course covers threat modeling, vulnerability assessment, and runtime monitoring, all of which are important skills for a Security Architect. Taking this course can help you build a foundation in security architecture and prepare you for a career as a Security Architect.
Chief Information Security Officer (CISO)
CISOs are responsible for the overall security of an organization's information systems. This course can help you develop the skills you need to conduct security assessments, develop security plans, and implement security solutions. The course covers threat modeling, vulnerability assessment, and runtime monitoring, all of which are important skills for a CISO. Taking this course can help you build a foundation in information security management and prepare you for a career as a CISO.
Security Researcher
Security Researchers identify and develop solutions to security vulnerabilities. This course can help you develop the skills you need to identify and assess vulnerabilities in Docker and Kubernetes environments. The course covers threat modeling, vulnerability assessment, and runtime monitoring, all of which are important skills for a Security Researcher. Taking this course can help you build a foundation in security research and prepare you for a career as a Security Researcher.
Threat Intelligence Analyst
Threat Intelligence Analysts collect and analyze data to identify and assess cybersecurity threats. This course can help you develop the skills you need to identify vulnerabilities in Docker and Kubernetes environments and develop strategies to mitigate those vulnerabilities. The course covers threat modeling, vulnerability assessment, and runtime monitoring. All of these skills are important for a Threat Intelligence Analyst. Taking this course can help you build a foundation in threat intelligence and prepare you for a career as a Threat Intelligence Analyst.
Security Manager
Security Managers are responsible for developing and managing the security of an organization's information systems. This course can help you develop the skills you need to conduct security assessments, develop security plans, and implement security solutions. The course covers threat modeling, vulnerability assessment, and runtime monitoring, all of which are important skills for a Security Manager. Taking this course can help you build a foundation in security management and prepare you for a career as a Security Manager.
Security Auditor
Security Auditors assess the security of an organization's information systems. This course can help you develop the skills you need to conduct security assessments, identify vulnerabilities, and develop strategies to mitigate those vulnerabilities. The course covers threat modeling, vulnerability assessment, and runtime monitoring, all of which are important skills for a Security Auditor. Taking this course can help you build a foundation in security auditing and prepare you for a career as a Security Auditor.
Information Security Analyst
Information Security Analysts are responsible for the security of an organization's information systems. This course can help you develop the skills you need to conduct security assessments, develop security plans, and implement security solutions. The course covers threat modeling, vulnerability assessment, and runtime monitoring, all of which are important skills for an Information Security Analyst. Taking this course can help you build a foundation in information security and prepare you for a career as an Information Security Analyst.
Application Security Engineer
Application Security Engineers are responsible for the security of software applications. This course can help you develop the skills you need to secure Docker and Kubernetes environments, which are commonly used to deploy software applications. The course covers threat modeling, vulnerability assessment, and runtime monitoring, all of which are important skills for an Application Security Engineer. Taking this course can help you build a foundation in application security and prepare you for a career as an Application Security Engineer.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Microservices Security.
Provides a theoretical foundation for security engineering. Covers topics such as threat modeling, risk assessment, and security controls, enhancing the understanding of the principles underlying microservices security.
Introduces the STRIDE threat modeling framework covered in the course. Provides practical techniques for identifying and mitigating security threats in software systems.
Introduces principles and best practices for writing secure code. Provides practical guidance for developing secure microservices applications and identifying and mitigating common security vulnerabilities.
Provides an overview of cloud security principles and practices. Covers topics such as identity and access management, data protection, and compliance, enhancing the understanding of security considerations for microservices deployed in cloud environments.
A comprehensive resource for understanding Kubernetes architecture and best practices. Provides foundational knowledge for the course's focus on microservices security in Kubernetes environments.
Covers various techniques used by attackers to exploit web applications. Provides insights into common vulnerabilities and attack vectors, enhancing the understanding of microservices security in web-based environments.
Emphasizes the importance of collaboration and tooling in DevOps practices. Provides insights into fostering a culture that prioritizes security throughout the software development lifecycle.
Introduces techniques for gathering and analyzing information from open sources. Provides insights into identifying and mitigating security threats and vulnerabilities in microservices environments.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Microservices Security.
Kubernetes Security: Cluster Hardening
Managing Sitecore Docker Containers
Kubernetes for Developers: Moving from Docker Compose to...
Kubernetes Security: Cluster Setup
Fundamentals of Docker and Kubernetes for .NET 5...
Handling Data and Stateful Applications in Docker and...
Deploying Containerized Workloads Using Google Cloud...
Guided Project: Scaling Applications with Kubernetes
Deploying a Python App with Oracle Cloud Container Engine...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser