IT Forensics for System Administrators Dealing with the organisational aspects...
Training – Forensics

IT Forensics for System Administrators Dealing with the organisational aspects...
Vulnerability Management (3 Submodules) Vulnerabilities, in software and...
Distributed Denial of Service (DDoS) protection 1. Introduction to DDoS Attacks...
IT Forensics for System Administrators Dealing with the organisational aspects of incident handling and forensics may sound like dry paperwork far away from the technical details of day-to-day...
Vulnerability Management (3 Submodules) Vulnerabilities, in software and sometimes even in hardware, are open gates attackers can utilize to gain access to private systems and networks. Worse, they have become a fact IT managers and administrators have to deal with, ever accompanied by the concern that a single critical vulnerability has been overlooked that will later be exploited. Submodule 1 Vulnerability Management addresses this problem with a systematic approach to make this a reliable...
Distributed Denial of Service (DDoS) protection 1. Introduction to DDoS Attacks – An overview of motivation and modus operandi of attackers (slides) (recording) DDoS attacks have been around for more than 20 years now, and over this time, they have gained in power, now reaching several terabits in bandwidth, enough to knock off ISPs. While the actual DDoS attacks have changed very little, the orchestration of the attacks, the deployment of their components and the motives of attackers have...
Domain Name System (DNS) protection 1. Introduction to DNS and its Security Challenges – meet the problems (slides) (recording) The Domain Name System (DNS) is one of the core services of the Internet as we know it today. DNS was designed in 1983 and has been a critical part of the Internet infrastructure ever since. This session gives an overview of how DNS works and, crucially, what the security implications of its design and operation are. 2. DNS for Network Defence – Using DNS to protect...
Client Privacy and Security 1. Browser Security and Privacy (slides) (recording) Web-browsers have long been ubiquitous as providing a window onto the internet, with their versatility being a key factor in their success. But web browsers can also be (mis)used for tracking the activities of their users. Not surprisingly, the security of browsers and the privacy of those who use them have become one of the most important topics in information security. For Firefox and Chromium-based browsers, the...
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |