[Training homepage] Dealing with the organisational aspects of incident handling and forensics may sound like dry paperwork far away from the technical details of day-to-day sysadmins tasks. However, organisational preparation can help tremendously in...
Uncategorized
[Training homepage] Vulnerabilities, in software and sometimes even in hardware, are open gates attackers can utilise to gain access to private systems and networks. Worse, they have become a fact IT managers and administrators have to deal with, ever...
[Training homepage] 1. Introduction to DDoS Attacks – An overview of motivation and modus operandi of attackers DDoS attacks have been around for more than 20 years now, and over this time, they have gained in power, now reaching several terabits in...
[Training homepage] 1. Introduction to DNS and its security challenges – meet the problems (slides) (recording) The Domain Name System (DNS) is one of the core services of the Internet as we know it today. DNS was designed in 1983 and has been a critical...
[Training homepage] 1. Browser Security and Privacy (recording) Web browsers have long been ubiquitous as providing a window onto the internet, with their versatility being a key factor in their success. But web browsers can also be (mis)used for...