Track CT-E —
Computer Emergency Response Team
This is part of
the AfNOG 2011 Workshop,
held in conjunction
with the AfNOG meeting in
Dar es Salaam, Tanzania, in May 2011.
Detailed Course Outline.
| DATE | TITLE | 
| 30-05-2011 |  | 
|  | Introduction – Welcome [pdf] Overview
  of Global Information Security Definitions,
  clarifications on concepts [pdf] | 
|  | Setup and Role of CSIRT What
  are the responsibilities of a CSIRT, services they offer, what are the steps
  to go through for creating a CSIRT [pdf] | 
|  | CSIRT Services Practical
  continuation of the previous session, with an emphasis on the different tools
  needed to offer those services. [pdf] | 
|  | Building Trust Networks Concept
  of computer networks, focusing on the security issues that can impact
  networked environments within CERT context. Idea
  of trusted networks, how to build and manage them. [pdf] | 
|  | Stages
  for Creating a CSIRT [pdf] | 
| 31-05-2011 |  | 
|  | Introduction "CSIRT philosophy and culture"  Be
  passionate, be talented, be problem solving oriented, be client oriented, be
  trustworthy. [pdf] | 
|  | Technical overview of Information Security Security
  Risk Analysis [pdf] Security
  & Cryptographic Methods. Encryption is very important. [pdf] Hands
  on, installation of virtual machine on participants
  personal laptops to be used for the coming labs. Lab:
  creation of secure communication channel by using PGP [pdf not Available] | 
| 01-06-2011 |  | 
|  | Incident handling Preparation:
  limit the number of incidents that will occur Detection
  and analysis: security breaches, incident classification, signs of incidents Containment,
  eradication, recovery: limit the spread, gather evidences, eliminate
  components, restore system to normal operation Post
  incident activities: lessons learned, data collected Hands
  on : PGP, Risk assessment: Failure Mode and Effects Analysis (FMEA) [pdf] | 
|  | Some Programming Related Vulnerabilities [pdf] | 
| 02-06-2011 |  | 
|  | Information Gathering and Analysis Forensic
  matters Implication
  with law information [pdf] | 
|  | Some CSIRT Tools [pdf] | 
|  | Preparing participants to be trainer [pdf] | 
| 03-06-2011 |  | 
|  | Advance Web Security [pdf
  Not Available] | 
·