Uncategorized

Uncategorized

Training – Forensics

IT Forensics for System Administrators Dealing with the organisational aspects of incident handling and forensics may sound like dry paperwork far away from the technical details of day-to-day...

Read More

Training – Vulnerability Management

Vulnerability Management (3 Submodules) Vulnerabilities, in software and sometimes even in hardware, are open gates attackers can utilize to gain access to private systems and networks. Worse, they have become a fact IT managers and administrators have to deal with, ever accompanied by the concern that a single critical vulnerability has been overlooked that will later be exploited. Submodule 1 Vulnerability Management addresses this problem with a systematic approach to make this a reliable...

Read More

Training – DDoS

Distributed Denial of Service (DDoS) protection 1. Introduction to DDoS Attacks – An overview of motivation and modus operandi of attackers (slides) (recording) DDoS attacks have been around for more than 20 years now, and over this time, they have gained in power, now reaching several terabits in bandwidth, enough to knock off ISPs. While the actual DDoS attacks have changed very little, the orchestration of the attacks, the deployment of their components and the motives of attackers have...

Read More

Training – Domain Name System (DNS) protection

Domain Name System (DNS) protection 1. Introduction to DNS and its Security Challenges – meet the problems (slides) (recording) The Domain Name System (DNS) is one of the core services of the Internet as we know it today. DNS was designed in 1983 and has been a critical part of the Internet infrastructure ever since. This session gives an overview of how DNS works and, crucially, what the security implications of its design and operation are. 2. DNS for Network Defence – Using DNS to protect...

Read More

Training – Client Privacy and Security

Client Privacy and Security 1. Browser Security and Privacy (slides) (recording) Web-browsers have long been ubiquitous as providing a window onto the internet, with their versatility being a key factor in their success. But web browsers can also be (mis)used for tracking the activities of their users. Not surprisingly, the security of browsers and the privacy of those who use them have become one of the most important topics in information security. For Firefox and Chromium-based browsers, the...

Read More
Skip to content