The Blue Team Training takes “IT Security for System Administrators” to a...
Training – Forensics
IT Forensics for System Administrators Dealing with the organisational aspects...
Training – Vulnerability Management
Vulnerability Management (3 Submodules) Vulnerabilities, in software and...
Uncategorized
The Blue Team Training takes “IT Security for System Administrators” to a new level. This new GÉANT security training programme aims to provide participants with practical and hands-on...
IT Forensics for System Administrators Dealing with the organisational aspects of incident handling and forensics may sound like dry paperwork far away from the technical details of day-to-day sysadmins tasks. However, organisational preparation can help...
Vulnerability Management (3 Submodules) Vulnerabilities, in software and sometimes even in hardware, are open gates attackers can utilise to gain access to private systems and networks. Worse, they have become a fact IT managers and administrators have...
Distributed Denial of Service (DDoS) protection 1. Introduction to DDoS Attacks – An overview of motivation and modus operandi of attackers (slides) (recording) DDoS attacks have been around for more than 20 years now, and over this time, they have...
Domain Name System (DNS) protection 1. Introduction to DNS and its Security Challenges – meet the problems (slides) (recording) The Domain Name System (DNS) is one of the core services of the Internet as we know it today. DNS was designed in 1983 and has...