Training
GÉANT organises a range of security training events to support its community. Please view the links below to find out more about current and future training.
Operating System Privacy and Security
Operating System Privacy and Security
This training consists of five modules look at effective management of privacy and security within the Windows Operating System. The training was previously run as a series of online webinars and the recordings of these sessions are available to view, as well as the course materials.
Client Privacy and Security
Client Privacy and Security
Web browsers have long been ubiquitous as providing a window onto the internet, with their versatility being a key factor in their success. But web browsers can also be (mis)used for tracking the activities of their users. Not surprisingly, the security of browsers and the privacy of those who use them have become one of the most important topics in information security.
Domain Name System (DNS) protection
Domain Name System (DNS) protection
The Domain Name System (DNS) is one of the core services of the Internet as we know it today. DNS was designed in 1983 and has been a critical part of the Internet infrastructure ever since. This course gives an overview of how DNS works and, crucially, what the security implications of its design and operation are.
Distributed Denial of Service (DDoS) protection
Distributed Denial of Service (DDoS) protection
DDoS attacks have been around for more than 20 years now, and over this time, they have gained in power, now reaching several terabits in bandwidth, enough to knock off ISPs. While the actual DDoS attacks have changed very little, the orchestration of the attacks, the deployment of their components and the motives of attackers have evolved. This course gives participants an overview of the attacks, the attackers, and their motivation and modus operandi.
Vulnerability Management
Vulnerability Management (three submodules)
Vulnerabilities, in software and sometimes even in hardware, are open gates attackers can utilise to gain access to private systems and networks. Worse, they have become a fact IT managers and administrators have to deal with, ever accompanied by the concern that a single critical vulnerability has been overlooked that will later be exploited.