Uncategorized

Training | IT Forensics for System Administrators

[Training homepage] Dealing with the organisational aspects of incident handling and forensics may sound like dry paperwork far away from the technical details of day-to-day sysadmins tasks. However, organisational preparation can help tremendously in...

Read More

Training | Vulnerability Management

[Training homepage] Vulnerabilities, in software and sometimes even in hardware, are open gates attackers can utilise to gain access to private systems and networks. Worse, they have become a fact IT managers and administrators have to deal with, ever...

Read More

Training | Domain Name System (DNS) protection

[Training homepage] 1. Introduction to DNS and its security challenges – meet the problems (slides) (recording) The Domain Name System (DNS) is one of the core services of the Internet as we know it today. DNS was designed in 1983 and has been a critical...

Read More

Training | Client Privacy and Security

[Training homepage] 1. Browser Security and Privacy (recording) Web browsers have long been ubiquitous as providing a window onto the internet, with their versatility being a key factor in their success. But web browsers can also be (mis)used for...

Read More
Skip to content