Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Specialized Hunts: Threat Hunting within Containers and Kubernetes

Threat actors target containers and Kubernetes for persistence, escalation, and data theft. This course teaches you to hunt for, investigate, and detect real threats in containerized environments using practical, hands-on techniques.

Advanced
1h

Created by Sean Wilkins

Last Updated Dec 17, 2025

Course Thumbnail
  • Course

Specialized Hunts: Threat Hunting within Containers and Kubernetes

Threat actors target containers and Kubernetes for persistence, escalation, and data theft. This course teaches you to hunt for, investigate, and detect real threats in containerized environments using practical, hands-on techniques.

Advanced
1h

Created by Sean Wilkins

Last Updated Dec 17, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Containers and Kubernetes clusters are increasingly targeted by attackers seeking to establish persistence, escalate privileges, or exfiltrate sensitive data; yet, many organizations struggle to detect and investigate these threats promptly. In this course, Specialized Hunts: Threat Hunting within Containers and Kubernetes, you’ll learn how to proactively identify and analyze malicious activity across containerized environments. First, you’ll discover how to detect remote Docker API misuse and spot suspicious container creation by examining network and host logs. Next, you’ll learn to identify reconnaissance and privilege escalation efforts against Kubernetes nodes by monitoring Kubelet API activity and correlating multiple log sources. Finally, you’ll acquire practical skills for uncovering persistence mechanisms via malicious CronJobs and investigating unauthorized access to sensitive secrets and credentials within Kubernetes. After completing this course, you’ll possess the skills and techniques needed to hunt for, investigate, and respond to real-world threats in Docker and Kubernetes environments, enhancing your ability to defend modern infrastructure against advanced attacks.

Specialized Hunts: Threat Hunting within Containers and Kubernetes
Advanced
1h
Table of contents

About the author
Sean Wilkins  - Pluralsight course - Specialized Hunts: Threat Hunting within Containers and Kubernetes
Sean Wilkins
40 courses 4.1 author rating 100 ratings

Sean Wilkins is an accomplished networking consultant and writer for infoDispersion (www.infodispersion.com) who has been in the IT field for over 20 years working with several large enterprises.

Get started with Pluralsight