Difference between revisions of "EGI CSIRT:TDG/SecTut-EGI220911"
Jump to navigation
Jump to search
(One intermediate revision by the same user not shown) | |||
Line 6: | Line 6: | ||
* Andrea Ceccanti: [https://www.egi.eu/indico/contributionDisplay.py?contribId=447&confId=452 How to create Argus policies] | * Andrea Ceccanti: [https://www.egi.eu/indico/contributionDisplay.py?contribId=447&confId=452 How to create Argus policies] | ||
* Daniel Kouril: [https://www.egi.eu/indico/contributionDisplay.py?contribId=452&confId=452 Advanced pakiti tutorial] | * Daniel Kouril: [https://www.egi.eu/indico/contributionDisplay.py?contribId=452&confId=452 Advanced pakiti tutorial] | ||
* Eygene Ryabinkin: https://www.egi.eu/indico/contributionDisplay.py?contribId=453&confId=452 SSC5 case study - Malware analysis] | * Eygene Ryabinkin: [https://www.egi.eu/indico/contributionDisplay.py?contribId=453&confId=452 SSC5 case study - Malware analysis] | ||
* Leif Nixon: [https://www.egi.eu/indico/contributionDisplay.py?contribId=449&confId=452 Incident workflow and forensic tools] | * Leif Nixon: [https://www.egi.eu/indico/contributionDisplay.py?contribId=449&confId=452 Incident workflow and forensic tools] | ||
* Antonio Perez Perez: [https://www.egi.eu/indico/contributionDisplay.py?contribId=450&confId=452 Linux rootkit and TTY hijacking] | * Antonio Perez Perez: [https://www.egi.eu/indico/contributionDisplay.py?contribId=450&confId=452 Linux rootkit and TTY hijacking] | ||
* Linda | * Linda Cornwall: [https://www.egi.eu/indico/contributionDisplay.py?contribId=451&confId=452 Vulnerability handling (what to do if you find a vulnerability and How are they handled)] |
Latest revision as of 13:28, 24 January 2012
EGI-CSIRT Public wiki EGI-CSIRT Private wiki
EGI-CSIRT Contacts | Back to TDG Main
Joint Security Training for System Administrators and Alike
The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The training will focus on two main areas: operational security and middleware security.
Contributors
- Dennis Van Dok, Mischa Salle, Oscar Koeroo: How to install and configure glexec
- Andrea Ceccanti: How to create Argus policies
- Daniel Kouril: Advanced pakiti tutorial
- Eygene Ryabinkin: SSC5 case study - Malware analysis
- Leif Nixon: Incident workflow and forensic tools
- Antonio Perez Perez: Linux rootkit and TTY hijacking
- Linda Cornwall: Vulnerability handling (what to do if you find a vulnerability and How are they handled)