This study plan is based on milestones. So, check how much you can cover within the timeline. The more you cover the topics, the better candidate you are for the job roles which require good knowledge of Docker and container security. Also, I assume you have already checked and are comfortable with Common Security Skills study plan.
Just to make sure that everyone understands what you need to learn to be good at Docker/container security. Docker Security is a focused subset of cloud-native security and DevSecOps. You need to understand how images and containers work, what can go wrong, and how to build and run them securely across the SDLC.
It is more towards:
- building minimal and secure container images,
- understanding runtime hardening and isolation,
- integrating image scanning into CI/CD,
- and working with DevSecOps / Platform teams on secure base images.
Usually it will take you 4-8 weeks to be comfortable with Docker Security fundamentals, assuming you already know basic Docker usage.
- Docker Security is not just running a scanner on images.
- Think more of image hygiene + least privilege + secure defaults.
- You should be comfortable writing and reviewing Dockerfiles.
- You must understand how containers differ from VMs and what isolation they provide (and don’t).
- You should know where Docker Security fits into DevSecOps and cloud security.
- Docker and Container Fundamentals - 1-2 weeks
- Image Build and Supply Chain Security - 1-2 weeks
- Runtime Hardening and Host Security - 1-2 weeks
- Scanning, Policies and CI/CD Integration - 1-2 weeks
- Books
- Videos
- Courses
- Certifications
- Interview Questions
Duration: 1-2 weeks
Goal here is to be very comfortable with how Docker works before going deep into security.
- Revisit basic Docker concepts:
- Images, layers, containers.
- Dockerfile instructions (FROM, RUN, COPY, CMD, ENTRYPOINT, EXPOSE, USER, etc.).
- Volumes and networking basics.
- Understand containers vs VMs:
- Namespaces and cgroups at high level.
- Shared kernel model and what isolation it gives.
- Practice:
- Build simple images from base images (alpine, debian, etc.).
- Run containers, inspect them, and play with basic commands.
Duration: 1-2 weeks
Here you focus on building secure images and understanding supply chain risk.
- Secure Dockerfile practices:
- Use minimal base images.
- Avoid unnecessary packages and tools.
- Do not run as root – use
USERproperly. - Separate build and runtime stages (multi-stage builds).
- Keep secrets out of images.
- Dependency and base image risk:
- Understand how vulnerabilities in base images affect you.
- Learn to track and update base images regularly.
- Basic supply chain concepts:
- Image registries and access controls.
- Image signing and provenance (high level).
- Practice:
- Take an existing Dockerfile and harden it step by step.
- Compare image sizes and contents before vs after.
Duration: 1-2 weeks
Even with secure images, runtime and host configuration matter a lot.
- Container runtime security basics:
- Dropping capabilities.
- Read-only filesystems where possible.
- Limiting resources (CPU/memory) via cgroups.
- Networking and exposure:
- Avoid unnecessary open ports.
- Use networks to separate services.
- Host hardening:
- Keep Docker engine and OS patched.
- Limit who can run Docker (docker group is effectively root).
- Logging and monitoring of Docker daemon and containers.
- Integration with orchestration:
- How these concepts later map into Kubernetes or other orchestrators (see Kubernetes Security Study Plan).
Duration: 1-2 weeks
This is where Docker Security meets DevSecOps.
- Image scanning:
- Understand what image scanners usually check (OS packages, app libs).
- Severity, fix availability, and risk-based triage.
- Where to scan: in CI, in registry, and/or in runtime.
- Policies and baselines:
- Define basic rules (no latest tags, specific allowed registries, minimal base images, no root user by default).
- Enforce through CI checks and registry policies.
- CI/CD integration:
- Cross-link with DevSecOps Study Plan.
- Add image build and scan stages into pipelines.
- Decide when to block vs warn.
- Any good Docker/Container fundamentals book – focus on sections about security and best practices.
- Books on container security or cloud-native security that include Docker as a base.
- Docker security talks from major conferences (DockerCon, KubeCon, OWASP).
- Short tutorials on writing secure Dockerfiles and hardening images.
- Videos on container runtime hardening and host security.
- Docker/Container security courses that cover image hardening and runtime security.
- DevSecOps courses that include container image scanning and CI/CD integration.
- Container or cloud-native security certifications where Docker is a key part of the curriculum.
- General cloud security certifications (AWS/Azure/GCP) if you deploy Docker workloads to cloud.
You can reuse some questions from Application Security and DevSecOps, but focus on containers:
- How would you harden a Dockerfile for a typical web application?
- What are common security risks in container images and how do you detect them?
- How would you integrate image scanning into a CI/CD pipeline?
- What are the implications of giving developers access to the
dockergroup on a host?