Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

EGI CSIRT:TDG/SecTut-EGI220911

From EGIWiki
Revision as of 12:18, 7 September 2011 by Dfouosso (talk | contribs) (Created page with '{{Egi-csirt-header}} <br/> The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The t…')
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search


| Mission | Members | Contacts
| Incident handling | Alerts | Monitoring | Security challenges | Procedures | Dissemination




The EGI CSIRT and the middleware security experts will join force again to provide security training for system adminsitrators and site managers. The training will focus on two main areas: operational security and middleware security.

There are 4 sessions scheduled as follow:

  • Thursday 22nd september. 14:00CET, room Rhone 4, duration 1h30.

https://www.egi.eu/indico/contributionDisplay.py?contribId=3&confId=452
Program:
How to install and configure glexec
How to create Argus policies

  • Thursday 22nd september. 16:00CET, room Rhone 4, duration 1h30.

https://www.egi.eu/indico/contributionDisplay.py?contribId=183&confId=452
Program:
Open discussion. Experts answer your questions about middleware security - architecture, configuration...

  • Friday 23th september. 9:00CET, room Rhone 4, duration 1h30.

https://www.egi.eu/indico/contributionDisplay.py?contribId=192&confId=452
Program:
Incident workflow and forensic tools
Linux rootkit and TTY hijacking
Vulnerability handling (what to do if you find a vulnerability and How are they handled)

  • Friday 23th september. 11:00CET, room Rhone 4, duration 1h30.

https://www.egi.eu/indico/contributionDisplay.py?contribId=193&confId=452
Program:
Advanced pakiti tutorial
SSC5 case study - Malware analysis
Using the security service challenge (SSC) framework