Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Subject

Target group

Laws & Regulations (privacy, data protection, export)

Systems management, users

Secure Software development

User, user coordinator, contractor

System hardening

System admin, network engineering

System operations

System admin, network engineering

Monitoring and logging

System admin, network engineering, response teams

Forensics

Response teams

Incident respons and analysis

Response teams

Contigency planning and disaster recovery

Management, governance, admin, user coordinator, response team

Organisation, roles, responsibilities (generic introduction)

All

AAI proces and procedures, FIM, SSO

System admin, user coordinator

Systems design

Architect, network engineer

General use and awarenessIT security awareness for users

Users, user coordinator, all

Developing and maintaining policies and procedures

Management, governance

Applying policies and procedures

Architect, system admin, user coodinator

System acquisition

Acquistion

Decommissioning (data leakage prevention)

Admins, governance, user coordinator

Risk management

 

...

Service lifecycle and secure practices during of each stage should be covered in-depth. These stages include requirement gathering, technology investigation, development, testing, deployment, production operation and retirement. It should also cover transitioning between stages.

Monitoring and logging

...

logging 

Monitoring and logging are the essential components which allow to track system events in their historical order. Without monitoring you are not able to be aware of any events going on in your system. Having found suspicious system behaviour must ultimately lead to further investigations, which normally are able only if extended logging has been done continuously.

The training will/should provide an overview about available monitoring and logging tools, central system logging and techniques used to analyse those combined loggings. Only centralized logging helps to combine system and network activities and get a comprehensive look on the overall attack.   

Forensics

...

Forensic analysts collect, preserve, and analyze digital evidence during the course of an investigation. Forensics includes but is not limited to system and user behaviour, file system content, communication patterns etc. There are a lot of techniques and tools out there, which can help to investigate on an suspicious activity within the system. The trainings should help system and network admins to doing their day to day business with the safeness on board to being wapponed against threads coming from the outside world.

...

 AAI processes and procedures, FIM, SSO

 Systems design

 General use and awareness

...

 

 IT security awareness for users 

Many of the research results produced will be publicly available. But also sensitive and confidential information pertaining to research, partners and employees are worked on. If these informations would become public, there would be significant damage. So protecting this sensitive information is of highest priority.

...