{"id":83236,"date":"2025-06-13T04:36:37","date_gmt":"2025-06-13T04:36:37","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83236"},"modified":"2025-06-24T13:57:15","modified_gmt":"2025-06-24T13:57:15","slug":"pen-testing-docker-and-kubernetes-for-secure-containerized-environments","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/","title":{"rendered":"Attacking Container Infrastructure: Docker and Kubernetes Weaknesses"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83236\" class=\"elementor elementor-83236\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b8eeb1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b8eeb1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e697c5e\" data-id=\"e697c5e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b63f1a9 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b63f1a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: June 12, 2025<\/div>\n<div><strong>Time<\/strong>: 2:30 PM WEST | 9:30 AM EDT | 7:00 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong> Attacking Container Infrastructure: Docker and Kubernetes Weaknesses<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong> Containers play a crucial role in digital transformation, enabling rapid deployment of cloud-native applications. Though considered secure, container systems have vulnerabilities that stem from the state of their configuration. As organizations increasingly adopt containerized environments to improve scalability and agility, threat actors are evolving to exploit weaknesses within the container infrastructure. In this webinar, we will explore pen testing for Docker and Kubernetes, which act as the backbone of modern DevOps pipelines. Through live demonstrations and case studies, this session will discuss how red teams detect and exploit vulnerabilities within Docker and Kubernetes and deploy backdoors. Attendees will also gain insights into how attackers target containerized workloads and learn strategies to build more resilient, secure environments.<\/p>\n<p><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>Understanding containers and container security<\/li>\n<li>Identifying common misconfigurations and attack vectors in Docker and Kubernetes<\/li>\n<li>Applying real-world exploitation techniques in container red teaming<\/li>\n<li>Recognizing container image vulnerabilities, exposed dashboards, and privilege escalation<\/li>\n<li>Exploring container breach attack vectors: access to lateral movement and persistence<\/li>\n<li>Implementing best practices for hardening container infrastructure and mitigating threats<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"alignleft wp-image-59705\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/Sergey-Chubarov.png\" alt=\"Sergey Chubarov,Security Expert\" width=\"192\" height=\"256\"><strong> Sergey Chubarov,<\/strong>Security Expert<\/p>\n<p><strong>Bio:&nbsp;<\/strong>Sergey Chubarov is a security and cloud expert and instructor with over 15 years of experience in Microsoft technologies. In his day-to-day job, he helps companies securely embrace cloud technologies. He has earned diverse certifications and recognitions such as Microsoft MVP: Security, OSCP, OSEP, eCPPT, eCPTX, Microsoft Certified Trainer, MCT Regional Lead, C|PSA, C|RT, and EC-Council&#8217;s C|EH, C|PENT, L|PT, C|CSE, C|EI, and more. He often speaks at local and international conferences like Global Azure, DEF CON, Black Hat Europe, Wild West Hackin&#8217; Fest, Security BSides, Workplace Ninja, Midwest Management Summit, Hack in the Box, etc.<\/p>\n<\/div>\n<div id=\"attend\"><\/div>\n<p><iframe width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/PZcXlHTMqDA?si=UwxfQhEzTH_UE-me\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen=\"\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: June 12, 2025 Time: 2:30 PM WEST | 9:30 AM EDT | 7:00 PM IST Topic: Attacking Container Infrastructure: Docker and Kubernetes Weaknesses Watch Now Abstract: Containers play a crucial role in digital transformation, enabling rapid deployment of cloud-native applications. Though considered secure, container systems have vulnerabilities that stem from the state of their&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83237,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83236","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Pen Testing Docker and Kubernetes for Secure Containerized Environments<\/title>\n<meta name=\"description\" content=\"Learn how to identify and mitigate vulnerabilities in Docker and Kubernetes environments through pen testing, red teaming, and best practices for secure container infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attacking Container Infrastructure: Docker and Kubernetes Weaknesses\" \/>\n<meta property=\"og:description\" content=\"Learn how to identify and mitigate vulnerabilities in Docker and Kubernetes environments through pen testing, red teaming, and best practices for secure container infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-13T04:36:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T13:57:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Pen-Testing-Docker-and-Kubernetes-for-Container-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Attacking Container Infrastructure: Docker and Kubernetes Weaknesses\",\"datePublished\":\"2025-06-13T04:36:37+00:00\",\"dateModified\":\"2025-06-24T13:57:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\\\/\"},\"wordCount\":308,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Pen-Testing-Docker-and-Kubernetes-for-Container-Security.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\\\/\",\"name\":\"Pen Testing Docker and Kubernetes for Secure Containerized Environments\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Pen-Testing-Docker-and-Kubernetes-for-Container-Security.jpg\",\"datePublished\":\"2025-06-13T04:36:37+00:00\",\"dateModified\":\"2025-06-24T13:57:15+00:00\",\"description\":\"Learn how to identify and mitigate vulnerabilities in Docker and Kubernetes environments through pen testing, red teaming, and best practices for secure container infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Pen-Testing-Docker-and-Kubernetes-for-Container-Security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Pen-Testing-Docker-and-Kubernetes-for-Container-Security.jpg\",\"width\":465,\"height\":310,\"caption\":\"Attacking Container Infrastructure: Docker and Kubernetes Weaknesses\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Attacking Container Infrastructure: Docker and Kubernetes Weaknesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pen Testing Docker and Kubernetes for Secure Containerized Environments","description":"Learn how to identify and mitigate vulnerabilities in Docker and Kubernetes environments through pen testing, red teaming, and best practices for secure container infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/","og_locale":"en_US","og_type":"article","og_title":"Attacking Container Infrastructure: Docker and Kubernetes Weaknesses","og_description":"Learn how to identify and mitigate vulnerabilities in Docker and Kubernetes environments through pen testing, red teaming, and best practices for secure container infrastructure.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-06-13T04:36:37+00:00","article_modified_time":"2025-06-24T13:57:15+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Pen-Testing-Docker-and-Kubernetes-for-Container-Security.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Attacking Container Infrastructure: Docker and Kubernetes Weaknesses","datePublished":"2025-06-13T04:36:37+00:00","dateModified":"2025-06-24T13:57:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/"},"wordCount":308,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Pen-Testing-Docker-and-Kubernetes-for-Container-Security.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/","name":"Pen Testing Docker and Kubernetes for Secure Containerized Environments","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Pen-Testing-Docker-and-Kubernetes-for-Container-Security.jpg","datePublished":"2025-06-13T04:36:37+00:00","dateModified":"2025-06-24T13:57:15+00:00","description":"Learn how to identify and mitigate vulnerabilities in Docker and Kubernetes environments through pen testing, red teaming, and best practices for secure container infrastructure.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Pen-Testing-Docker-and-Kubernetes-for-Container-Security.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Pen-Testing-Docker-and-Kubernetes-for-Container-Security.jpg","width":465,"height":310,"caption":"Attacking Container Infrastructure: Docker and Kubernetes Weaknesses"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-docker-and-kubernetes-for-secure-containerized-environments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Attacking Container Infrastructure: Docker and Kubernetes Weaknesses"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83236"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83236\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83237"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}