Training

The GÉANT GN4 project has arranged a series of training events to support the community. The training events have been offered live throughout 2020 / 21. Previously run sessions are available for viewing on GÉANTTV.

Operating system privacy and security

  • Operating System Telemetry – configuring protection in Windows 10 (slides) (recording)
  • Logging and Audit – Log management and Audit strategies (slides) (recording)
  • File Integrity Monitoring (FIM) for detecting security incidents (slides) (recording)
  • Network 1st Hop Security (slides) (recording)
  • Authentication methods – how to avoid common pitfalls (slides – coming soon) (recording)

Client Privacy and Security

Domain Name System (DNS) protection

  • Introduction to DNS and its Security Challenges – meet the problems (slides) (recording)
  • DNS for Network Defence – Using DNS to protect and observe (slides) (recording)
  • DNSSEC – Protecting the integrity of the Domain Naming System (slides) (recording)
  • DNS Privacy Protocols – Encrypted DNS queries for privacy protection (slides) (recording)

Distributed Denial of Service (DDoS) protection – coming soon

  • Introduction to DDoS Attacks – An overview of motivation and modus operandi of attackers (slides) (recording)
  • Details of selected DDoS Attacks – How the attacks work from a technical perspective (slides) (recording)
  • DDoS Detection – How to know if you are under attack or partake in an attack (slides) (recording)
  • DDoS Mitigation – What you can do against them? (slides) (recording)

Vulnerability Management

  • Vulnerability Management Process & Standards (slides) (recording)
  • Vulnerability Information – How to gather and distribute security advisories to your constituency (slides) (recording)
  • Patch Management – How to roll out and track security fixes to your systems (slides) (recording)
  • Looking into the network – how to scan local systems for
    vulnerabilities and misconfigurations (slides) (recording)
  • Network Vulnerability Scanning – Looking from Afar (slides) (recording)
  • Penetration tests – how does your network stand up against real attacks? (slides) (recording)
  • Code Audits (slides) (recording)
  • Vulnerability disclosure (slides) (recording)
  • Breach and attack simulation – matching attacker behaviour with vulnerabilities (slides) (recording)
Skip to content