Difference between revisions of "EGI CSIRT:TDG/SecTut-EGI220911"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
{{new-Egi-csirt-header-TDG}} | {{new-Egi-csirt-header-TDG}} | ||
== Joint Security Training for System Administrators and Alike == | |||
The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The training will focus on two main areas: operational security and middleware security. | The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The training will focus on two main areas: operational security and middleware security. | ||
=== Contributors === | |||
* Dennis Van Dok, Mischa Salle, Oscar Koeroo: [https://www.egi.eu/indico/contributionDisplay.py?contribId=446&confId=452 How to install and configure glexec] | |||
* Andrea Ceccanti: [https://www.egi.eu/indico/contributionDisplay.py?contribId=447&confId=452 How to create Argus policies] | |||
* Daniel Kouril: [https://www.egi.eu/indico/contributionDisplay.py?contribId=452&confId=452 Advanced pakiti tutorial] | |||
* Eygene Ryabinkin: https://www.egi.eu/indico/contributionDisplay.py?contribId=453&confId=452 SSC5 case study - Malware analysis] | |||
* | * Leif Nixon: [https://www.egi.eu/indico/contributionDisplay.py?contribId=449&confId=452 Incident workflow and forensic tools] | ||
https://www.egi.eu/indico/contributionDisplay.py?contribId= | * Antonio Perez Perez: [https://www.egi.eu/indico/contributionDisplay.py?contribId=450&confId=452 Linux rootkit and TTY hijacking] | ||
* Linda Kornwall: [https://www.egi.eu/indico/contributionDisplay.py?contribId=451&confId=452 Vulnerability handling (what to do if you find a vulnerability and How are they handled)] | |||
* | |||
https://www.egi.eu/indico/contributionDisplay.py?contribId= | |||
* | |||
https://www.egi.eu/indico/contributionDisplay.py?contribId= | |||
Incident workflow and forensic tools | |||
Linux rootkit and TTY hijacking | |||
* | |||
https://www.egi.eu/indico/contributionDisplay.py?contribId= | |||
Revision as of 17:59, 27 November 2011
EGI-CSIRT Public wiki EGI-CSIRT Private wiki
EGI-CSIRT Contacts | Back to TDG Main
Joint Security Training for System Administrators and Alike
The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The training will focus on two main areas: operational security and middleware security.
Contributors
- Dennis Van Dok, Mischa Salle, Oscar Koeroo: How to install and configure glexec
- Andrea Ceccanti: How to create Argus policies
- Daniel Kouril: Advanced pakiti tutorial
- Eygene Ryabinkin: https://www.egi.eu/indico/contributionDisplay.py?contribId=453&confId=452 SSC5 case study - Malware analysis]
- Leif Nixon: Incident workflow and forensic tools
- Antonio Perez Perez: Linux rootkit and TTY hijacking
- Linda Kornwall: Vulnerability handling (what to do if you find a vulnerability and How are they handled)