Difference between revisions of "EGI CSIRT:TDG/SecTut-EGI220911"
(Created page with '{{Egi-csirt-header}} <br/> The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The t…') |
|||
Line 1: | Line 1: | ||
{{Egi-csirt-header}} | {{ Egi-csirt-dissemination-header}} | ||
<br/> | <br/> | ||
The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The training will focus on two main areas: operational security and middleware security. | The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The training will focus on two main areas: operational security and middleware security. |
Revision as of 14:51, 7 September 2011
| Mission | Members | Contacts
| Incident handling | Alerts | Monitoring | Security challenges | Procedures | Dissemination
EGI-CSIRT Training and dissemination: Entry point | Advisories | Operational notices | Events | Objectives
The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The training will focus on two main areas: operational security and middleware security.
There are 4 sessions scheduled as follow:
- Thursday 22nd september. 14:00CET, room Rhone 4, duration 1h30.
https://www.egi.eu/indico/contributionDisplay.py?contribId=3&confId=452
Program:
How to install and configure glexec
How to create Argus policies
- Thursday 22nd september. 16:00CET, room Rhone 4, duration 1h30.
https://www.egi.eu/indico/contributionDisplay.py?contribId=183&confId=452
Program:
Open discussion. Experts answer your questions about middleware security - architecture, configuration...
- Friday 23th september. 9:00CET, room Rhone 4, duration 1h30.
https://www.egi.eu/indico/contributionDisplay.py?contribId=192&confId=452
Program:
Incident workflow and forensic tools
Linux rootkit and TTY hijacking
Vulnerability handling (what to do if you find a vulnerability and How are they handled)
- Friday 23th september. 11:00CET, room Rhone 4, duration 1h30.
https://www.egi.eu/indico/contributionDisplay.py?contribId=193&confId=452
Program:
Advanced pakiti tutorial
SSC5 case study - Malware analysis
Using the security service challenge (SSC) framework