Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "EGI CSIRT:TDG/SecTut-EGI220911"

From EGIWiki
Jump to navigation Jump to search
Line 1: Line 1:
{{new-Egi-csirt-header-TDG}}
{{new-Egi-csirt-header-TDG}}
{{ Egi-csirt-dissemination-header}}
<br/>
<br/>
The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The training will focus on two main areas: operational security and middleware security.
The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The training will focus on two main areas: operational security and middleware security.

Revision as of 17:45, 27 November 2011

EGI-CSIRT Public wiki EGI-CSIRT Private wiki


EGI-CSIRT Contacts | Back to TDG Main


The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The training will focus on two main areas: operational security and middleware security.

There are 4 sessions scheduled as follow:

  • Thursday 22nd september. 14:00CET, room Rhone 4, duration 1h30.

https://www.egi.eu/indico/contributionDisplay.py?contribId=3&confId=452
Program:
How to install and configure glexec
How to create Argus policies

  • Thursday 22nd september. 16:00CET, room Rhone 4, duration 1h30.

https://www.egi.eu/indico/contributionDisplay.py?contribId=183&confId=452
Program:
Open discussion. Experts answer your questions about middleware security - architecture, configuration...

  • Friday 23th september. 9:00CET, room Rhone 4, duration 1h30.

https://www.egi.eu/indico/contributionDisplay.py?contribId=192&confId=452
Program:
Incident workflow and forensic tools
Linux rootkit and TTY hijacking
Vulnerability handling (what to do if you find a vulnerability and How are they handled)

  • Friday 23th september. 11:00CET, room Rhone 4, duration 1h30.

https://www.egi.eu/indico/contributionDisplay.py?contribId=193&confId=452
Program:
Advanced pakiti tutorial
SSC5 case study - Malware analysis
Using the security service challenge (SSC) framework