Search results

169 items matching your search terms.
Filter the results.
Item type















































New items since



Sort by relevance · date (newest first) · alphabetically
File application/x-maker EXE3_Forensic_analysis_III-Handbook
Located in Topics / / Documents / 2016-resources
File Troff document EXE3_Forensic_analysis_III-toolset
Located in Topics / / Documents / 2016-resources
Files
Located in Topics / Trainings for Cyber Security Specialists / Online training material
File Guidelines
Located in Topics / / NIS in Education / NIS Brokerage
Image JPEG image Honeypot
Honeypot
Located in Topics / / Online training material / Images
Images
Images
Located in Topics / Trainings for Cyber Security Specialists / Online training material
File application/x-maker Incident handling during attack on Critical Information Infrastructure Handbook
In this exercise, the participants should learn to conduct incident handling procedures related to Critical Information Infrastructure (CII) and Supervisory Control and Data Acquisition (SCADA) systems and be prepared to address incidents and overcome obstacles.
Located in Topics / / Online training material / Documents
File Troff document Incident handling during attack on Critical Information Infrastructure Toolset
In this exercise, the participants should learn to conduct incident handling procedures related to Critical Information Infrastructure (CII) and Supervisory Control and Data Acquisition (SCADA) systems and be prepared to address incidents and overcome obstacles.
Located in Topics / / Online training material / Documents
File application/x-maker Incident Handling in Live Role Playing Handbook
The exercise simulates a real-life incident, involving many parties with conflicts of interests, different mindsets and legal frameworks, etc. With the introduction of such aspects as vulnerability handling, responsible disclosure and company security management, it helps the students to understand why incident handling is, in many cases, a complex task and what kinds of technical and social skills are required for this job.
Located in Topics / / Online training material / Documents
File Troff document Incident Handling in Live Role Playing Toolset
The exercise simulates a real-life incident, involving many parties with conflicts of interests, different mindsets and legal frameworks, etc. With the introduction of such aspects as vulnerability handling, responsible disclosure and company security management, it helps the students to understand why incident handling is, in many cases, a complex task and what kinds of technical and social skills are required for this job.
Located in Topics / / Online training material / Documents

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information