Search results

171 items matching your search terms.
Filter the results.
Item type
















































New items since



Sort by relevance · date (newest first) · alphabetically
File application/x-maker Triage and Basic Incident Handling Handbook
This exercise provides students with experience of real-life incident reports, their ambiguity and complexity. After finishing the exercise they should understand what to focus on during initial analysis, how different factors may affect priorities and how to communicate with reporters as well as third parties. During the exercise, they will apply a given classification scheme to incidents – the purpose of this part of the exercise is to work on the consistent classification of disputable cases (eg, worm v scanning) across team members and possibly to suggest a clearer, more unambiguous classification scheme for the team.
Located in Topics / / Online training material / Documents
File Troff document Triage and Basic Incident Handling Toolset
Triage and Basic Incident Handling Toolset
Located in Topics / / Online training material / Documents
Image Triage and Basic Incident Handling image
Triage and Basic Incident Handling image
Located in Topics / / Online training material / Images
File object code Virtual Image How To
Located in Topics / / Online training material / Documents
File Virtual worlds
Located in Topics / / NIS in Education / NIS Brokerage
Image JPEG image Vulnerability
Vulnerability
Located in Topics / / Online training material / Images
File application/x-maker Vulnerability Handling Handbook
To provide a practical overview of the vulnerability handling process and how vulnerabilities reported to a CERT team should be handled. Also, to provide some hands-on experience with difficult situations that may arise through the role of coordinator.
Located in Topics / / Online training material / Documents
File PDF document Vulnerability Handling toolset
To provide a practical overview of the vulnerability handling process and how vulnerabilities reported to a CERT team should be handled. Also, to provide some hands-on experience with difficult situations that may arise through the role of coordinator.
Located in Topics / / Online training material / Documents
File VW
Located in Topics / / NIS in Education / NIS Brokerage
File application/x-maker Writing Security Advisories Handbook
The objective of the exercise is to provide a practical overview of what constitutes a good and a bad advisory publication for a CERT constituency.
Located in Topics / / Online training material / Documents

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information