- Linux and Docker (Compose) Basics
- Nginx Reverse Proxy for secure connection of Docker containers via https to public networks
- Threat Modelling with OWASP Threat Dragon
- Software Composition Analysis (SCA) with OWASP Dependency Check and Static application security testing (SAST) with Sonarcloud
- XSS Hacking Challenge
- Exploring Docker Security, Docker Escape and Isolation Concepts with Local File Inclusion (LFI) through a phpMyAdmin 4.8.1 exploit