Never Ending Security

It starts all here

European Network and Information Security Agency (ENISA) Training Materials

Complete overview can be found at:
http://www.enisa.europa.eu/activities/cert/support/exercise

No. Exercise title Handbook Toolset Virtual Image Other material supporting the exercise
1 Triage & basic incident handling Download Download Download Online version of Exercise 1
2 Incident handling procedure testing Download Download Online version of Exercise 2
3 Recruitment of CERT staff Download Download Online version of Exercise 3
4 Developing CERT infrastructure Download Download Online version of Exercise 4
5 Vulnerability handling Download Download Online version of Exercise 5
6 Writing security advisories Download Download Online version of Exercise 6
7 Network forensics Download Download Online version of Exercise 7
8 Establishing external contacts Download Download Online version of Exercise 8
9 Large scale incident handling Download Download Online version of Exercise 9
10 Automation in incident handling Download Download Online version of Exercise 10
11 Incident handling in live role playing Download Download Online version of Exercise 11
12 Cooperation with Law Enforcement agencies Download Download Online version of Exercise 12
13 Incident handling during an attack on Critical Information Infrastructure Download Download
14 Proactive incident detection Download Download
15 Cost of ICT incident Download Download Download MS Excel workbook, Download workbook in open format
16 Mobile threats incident handling Download Download
17 Incident handling in the cloud Download Download
18 Advanced Persistent Threat incident handling Download Download
19 CERT participation in incident handling related to the Article 13a obligations Download Download Download data_ddos.pcap
20 CERT participation in incident handling related to the Article 4 obligations Download Download
21 Assessing and Testing Communication Channels with CERTs and all their stakeholders Download Download
22 Social networks used as an attack vector for targeted attacks Download Download
23 Honeypots Download Download Download
24 Digital forensics Download Download Download
25 Identification and handling of electronic evidence Download Download
26 Identifying and handling cyber-crime traces Download Download
27 Presenting, correlating and filtering various feeds Download Download DownloadDownload
28 Incident handling and cooperation during phishing campaign Download Download
29 Cooperation in the Area of Cybercrime Download Download

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s