Track CT-E — Computer Emergency Response Team

This is part of the AfNOG 2011 Workshop, held in conjunction

with the AfNOG meeting in Dar es Salaam, Tanzania, in May 2011.


 

 

Detailed Course Outline.

 

DATE

TITLE

30-05-2011

 

 

Introduction – Welcome [pdf]

Overview of Global Information Security

Definitions, clarifications on concepts [pdf]

 

Setup and Role of CSIRT

What are the responsibilities of a CSIRT, services they offer, what are the steps to go through for creating a CSIRT [pdf]

 

CSIRT Services

Practical continuation of the previous session, with an emphasis on the different tools needed to offer those services. [pdf]

 

Building Trust Networks

Concept of computer networks, focusing on the security issues that can impact networked environments within CERT context.

Idea of trusted networks, how to build and manage them. [pdf]

 

Stages for Creating a CSIRT [pdf]

31-05-2011

 

 

Introduction "CSIRT philosophy and culture"

Be passionate, be talented, be problem solving oriented, be client oriented, be trustworthy. [pdf]

 

Technical overview of Information Security

Security Risk Analysis [pdf]

Security & Cryptographic Methods. Encryption is very important. [pdf]

Hands on, installation of virtual machine on participants personal laptops to be used for the coming labs.

Lab: creation of secure communication channel by using PGP [pdf not Available]

01-06-2011

 

 

Incident handling

Preparation: limit the number of incidents that will occur

Detection and analysis: security breaches, incident classification, signs of incidents

Containment, eradication, recovery: limit the spread, gather evidences, eliminate components, restore system to normal operation

Post incident activities: lessons learned, data collected

Hands on : PGP, Risk assessment: Failure Mode and Effects Analysis (FMEA) [pdf]

 

Some Programming Related Vulnerabilities [pdf]

02-06-2011

 

 

Information Gathering and Analysis

Forensic matters

Implication with law information [pdf]

 

Some CSIRT Tools [pdf]

 

Preparing participants to be trainer [pdf]

03-06-2011

 

 

Advance Web Security [pdf Not Available]

·