Understands the key differences between virtualisation and containerisation • Can identify and interrogate running containers on a host • Understands the concepts of layered filesystems and how to extract and analyse specific layers within an image • Can identify common vulnerabilities and weaknesses present in containers, including: • Missing security patches • Weak file permissions • Insufficient or lack of resource quotas • Presence of sensitive information in environment variables, running processes or filesystem • Understands and can analyse Dockerfile files to uncover weaknesses in static images, including: • Use of unencrypted connections for performing downloads • Use of overly generous permissions, e.g. running as the root user 30 • Inclusion of sensitive information, e.g. passwords or private keys • Unnecessary exposure of ports