Training

GÉANT organises a range of security training events to support its community. Please view the links below to find out more about current and future training.

Operating system privacy and security

Operating System Privacy and Security | This training consists of five modules look at effective management of privacy and security within the Windows Operating System. The training was previously run as a series of online webinars and the recordings of these sessions are available to view, as well as the course materials.

Client Privacy and Security

Client Privacy and Security | Web-browsers have long been ubiquitous as providing a window onto the internet, with their versatility being a key factor in their success. But web browsers can also be (mis)used for tracking the activities of their users. Not surprisingly, the security of browsers and the privacy of those who use them have become one of the most important topics in information security.

Domain Name System (DNS) protection

Domain Name System (DNS) protection | The Domain Name System (DNS) is one of the core services of the Internet as we know it today. DNS was designed in 1983 and has been a critical part of the Internet infrastructure ever since. This course gives an overview of how DNS works and, crucially, what the security implications of its design and operation are.

Distributed Denial of Service (DDoS) protection

Distributed Denial of Service (DDoS) protection | DDoS attacks have been around for more than 20 years now, and over this time, they have gained in power, now reaching several terabits in bandwidth, enough to knock off ISPs. While the actual DDoS attacks have changed very little, the orchestration of the attacks, the deployment of their components and the motives of attackers have evolved. This course gives participants an overview of the attacks, the attackers, and their motivation and modus operandi.

Vulnerability Management

Vulnerability Management (three submodules) | Vulnerabilities, in software and sometimes even in hardware, are open gates attackers can utilise to gain access to private systems and networks. Worse, they have become a fact IT managers and administrators have to deal with, ever accompanied by the concern that a single critical vulnerability has been overlooked that will later be exploited.

IT Forensics for System Administrators

IT Forensics for System Administrators | Dealing with the organisational aspects of incident handling and forensics may sound like dry paperwork far away from the technical details of day-to-day sysadmins tasks, however, organisational preparation can help tremendously in the course of an investigation. For example, answering simple practical questions like “who’s in charge?” or “what are we looking for?”, even “why are we doing this?”. This module introduces the basic steps of incident handling and forensic investigations, and introduces attendees to the principles of forensic investigations that should be adhered to for an investigation to succeed.

Blue Team Training

Blue Team Training | This new GÉANT security training programme aims to provide participants with practical and hands-on experience of some basic tasks in intrusion detection and countermeasures. This is achieved by providing a small lab environment of a handful of Linux servers that send their logs to a central log server, which provides an Elasticsearch interface to query the stored logs.
Skip to content