Search results

176 items matching your search terms.
Filter the results.
Item type

























































New items since



Sort by relevance · date (newest first) · alphabetically
File Troff document Advanced_persistent_threat_incident_handling_toolset
Advanced_persistent_threat_incident_handling_toolset
Located in Topics / / Online training material / Documents
File application/x-maker Advanced_persistent_threat_incident_handling_handbook
Advanced_persistent_threat_incident_handling_handbook
Located in Topics / / Online training material / Documents
File Troff document Incident_handling_in_the_cloud_toolset
Incident_handling_in_the_cloud_toolset
Located in Topics / / Online training material / Documents
File application/x-maker Incident_handling_in_the_cloud_handbook
Incident_handling_in_the_cloud_handbook
Located in Topics / / Online training material / Documents
File Troff document Cooperation with Law Enforcement Agencies - Advising in Cyber Crime Cases Toolset
To explain a CERT’s role in advising in a cyber-crime case and the basis for its effective cooperation with an LEA.
Located in Topics / / Online training material / Documents
File application/x-maker Cooperation with Law Enforcement Agencies - Advising in Cyber Crime Cases Handbook
To explain a CERT’s role in advising in a cyber-crime case and the basis for its effective cooperation with an LEA.
Located in Topics / / Online training material / Documents
File Troff document Proactive Incident Detection Toolset
During this exercise, the AbuseHelper application will be set up and used to consolidate diverse incident relevant information feeds. The participants will learn how to install, maintain and work with the tool.
Located in Topics / / Online training material / Documents
File application/x-maker Proactive Incident Detection Handbook
During this exercise, the AbuseHelper application will be set up and used to consolidate diverse incident relevant information feeds. The participants will learn how to install, maintain and work with the tool.
Located in Topics / / Online training material / Documents
File application/x-maker Incident handling during attack on Critical Information Infrastructure Handbook
In this exercise, the participants should learn to conduct incident handling procedures related to Critical Information Infrastructure (CII) and Supervisory Control and Data Acquisition (SCADA) systems and be prepared to address incidents and overcome obstacles.
Located in Topics / / Online training material / Documents
File Troff document Incident Handling in Live Role Playing Toolset
The exercise simulates a real-life incident, involving many parties with conflicts of interests, different mindsets and legal frameworks, etc. With the introduction of such aspects as vulnerability handling, responsible disclosure and company security management, it helps the students to understand why incident handling is, in many cases, a complex task and what kinds of technical and social skills are required for this job.
Located in Topics / / Online training material / Documents

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information