Application Security Training by ThriveDX
KONTRA
    • OWASP Top 10 for Web
    • OWASP Top 10 for API
    • AWS Top 10
    • Front-end Top 5
    • OWASP Top 10 for iOS
    • Docker CLI Top 10
    • Docker Compose Top 10
  • Try SCORM
  • Plans
  • About
  • Plans & Pricing
  • About Company
  • Try SCORM
  • Get Your Free Trial
  • Book a Demo
  • OWASP Top 10 for Web
  • OWASP Top 10 for API
  • AWS Top 10
  • Front-end Top 5
  • OWASP Top 10 for iOS
  • Docker CLI Top 10
  • Docker Compose Top 10
  • DEMO VIDEO

Kontra Docker Compose Top 10

  • Exposed Docker Socket

    NEW
    Exposed Docker Socket
  • Container Resources Limitation

    NEW
    Container Resources Limitation
  • Privileged Containers

    NEW
    Privileged Containers
  • Host Update

    NEW
    Host Update
  • Unsegregated Container Network

    NEW
    Unsegregated Container Network
  • Improper Write Permissions for Volumes and Host Filesystem

    NEW
    Improper Write Permissions for Volumes and Host Filesystem
  • Sensitive Data Leak via Docker Images

    NEW
    Sensitive Data Leak via Docker Images
  • Unverified Container Images

    NEW
    Unverified Container Images
  • Minimal Base Image

    NEW
    Minimal Base Image
  • Insecure Image Registries

    NEW
    Insecure Image Registries
Kontra Logo
KONTRA
AppSec Training by ThriveDX

MENU

  • Kontra
  • About
  • Book a Demo
  • Terms & Conditions
  • Privacy Policy
  • Cookies Policy

Kontra Application Security Training PTE. LTD.

#14-04 Singapore Business Federation Centre,
160 Robinson Road,
Singapore,
068914,
appsec@thrivedx.com

Copyright © 2022 Kontra Application Security Training PTE. LTD.
Embed Exercise

Use the following code snippet to embed the exercise card on your web page, blog or wiki

Demo Video
Kontra demo video
Book a Demo
Get Your Free Trial
We use cookies to ensure you get the best experience on our website. Accept
Read more