The GÉANT GN4 project has arranged a series of training events to support the community. The training events have been offered live throughout 2020 / 21. Previously run sessions are available for viewing on GÉANTTV.
Operating system privacy and security
- Operating System Telemetry – configuring protection in Windows 10 (slides) (recording)
- Logging and Audit – Log management and Audit strategies (slides) (recording)
- File Integrity Monitoring (FIM) for detecting security incidents (slides) (recording)
- Network 1st Hop Security (slides) (recording)
- Authentication methods – how to avoid common pitfalls (slides – coming soon) (recording)
Client Privacy and Security
- Browser Security & Privacy (slides) (recording)
- E-Mail Security and Privacy (slides) (recording)
- Instant Messaging Security and Privacy (slides) (recording)
- Videoconferencing Security and Privacy (slides) (recording)
- Office Security and Privacy (slides) (recording)
Domain Name System (DNS) protection
- Introduction to DNS and its Security Challenges – meet the problems (slides) (recording)
- DNS for Network Defence – Using DNS to protect and observe (slides) (recording)
- DNSSEC – Protecting the integrity of the Domain Naming System (slides) (recording)
- DNS Privacy Protocols – Encrypted DNS queries for privacy protection (slides) (recording)
Distributed Denial of Service (DDoS) protection – coming soon
- Introduction to DDoS Attacks – An overview of motivation and modus operandi of attackers (slides) (recording)
- Details of selected DDoS Attacks – How the attacks work from a technical perspective (slides) (recording)
- DDoS Detection – How to know if you are under attack or partake in an attack (slides) (recording)
- DDoS Mitigation – What you can do against them? (slides) (recording)
Vulnerability Management
- Vulnerability Management Process & Standards (slides) (recording)
- Vulnerability Information – How to gather and distribute security advisories to your constituency (slides) (recording)
- Patch Management – How to roll out and track security fixes to your systems (slides) (recording)
- Looking into the network – how to scan local systems for
vulnerabilities and misconfigurations (slides) (recording) - Network Vulnerability Scanning – Looking from Afar (slides) (recording)
- Penetration tests – how does your network stand up against real attacks? (slides) (recording)
- Code Audits (slides) (recording)
- Vulnerability disclosure (slides) (recording)
- Breach and attack simulation – matching attacker behaviour with vulnerabilities (slides) (recording)