Search results

176 items matching your search terms.
Filter the results.
Item type


























































New items since



Sort by relevance · date (newest first) · alphabetically
File application/x-maker Incident Handling in Live Role Playing Handbook
The exercise simulates a real-life incident, involving many parties with conflicts of interests, different mindsets and legal frameworks, etc. With the introduction of such aspects as vulnerability handling, responsible disclosure and company security management, it helps the students to understand why incident handling is, in many cases, a complex task and what kinds of technical and social skills are required for this job.
Located in Topics / / Online training material / Documents
File Troff document Automation in Incident Handling Toolset
The purpose of this exercise is to develop students’ abilities to create custom scripts and filters dealing with large amounts of data like IP addresses. After completing the exercise students should be able to extract useful information from bulk data, even in non-standard formats.
Located in Topics / / Online training material / Documents
File application/x-maker Automation in Incident Handling Handbook
The purpose of this exercise is to develop students’ abilities to create custom scripts and filters dealing with large amounts of data like IP addresses. After completing the exercise students should be able to extract useful information from bulk data, even in non-standard formats.
Located in Topics / / Online training material / Documents
File Troff document Large Scale Incident Handling Toolset
The main objective of the exercise is to teach incident handlers the key information and actions required for the successful resolution of large-scale incidents.
Located in Topics / / Online training material / Documents
File application/x-maker Large Scale Incident Handling Handbook
The main objective of the exercise is to teach incident handlers the key information and actions required for the successful resolution of large-scale incidents.
Located in Topics / / Online training material / Documents
File application/x-maker Writing Security Advisories Handbook
The objective of the exercise is to provide a practical overview of what constitutes a good and a bad advisory publication for a CERT constituency.
Located in Topics / / Online training material / Documents
File PDF document Vulnerability Handling toolset
To provide a practical overview of the vulnerability handling process and how vulnerabilities reported to a CERT team should be handled. Also, to provide some hands-on experience with difficult situations that may arise through the role of coordinator.
Located in Topics / / Online training material / Documents
File application/x-maker Vulnerability Handling Handbook
To provide a practical overview of the vulnerability handling process and how vulnerabilities reported to a CERT team should be handled. Also, to provide some hands-on experience with difficult situations that may arise through the role of coordinator.
Located in Topics / / Online training material / Documents
File Troff document Developing CERT Infrastructure Toolset
To learn what kind of software and hardware solutions could be used to provide a particular CERT service for a constituency.
Located in Topics / / Online training material / Documents
File application/x-maker Developing CERT Infrastructure Handbook
To learn what kind of software and hardware solutions could be used to provide a particular CERT service for a constituency.
Located in Topics / / Online training material / Documents

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information