Target Audience
Operators interested in deploying DNS Security as part of their security infrastructure and people with a general interest in DNSSEC, and those contemplating whether or not to deploy DNSSEC in their organisation.
Pre-requisites
Basic DNS, Public key encryption and basic knowledge about UNIX System Administration
Course Outline
This tutorial covers the following topics:
• Introduction/Review of DNSSEC
• Securing zone transfer (TSIG)
• Securing a zone
• Configuring a security-aware resolver
• Delegation of signing authority
• Rolling keys
• Troubleshooting
• DPS
• DNSSEC deployment plan
• OpenDNSSEC
Technologies Covered
DNS, TSIG, DNSSEC including NSEC3
AfricaCERT meetings provide a forum for collaboration and exchange for Computer Emergency response Teams and interested parties to sharing common practices, information, tools, techniques, and strategies that address problems related to cyber-security.
AfricaCERT Day builds on the experience from previous AfricaCERT events held in different African countries in collaboration with AfNOG and AFRINIC.
AfricaCERT V Day follows three days of Intensive training in collaboration with FIRST and JPCERT.
AfricaCERT V theme is “Our Role in the African Internet Ecosystem”.
Le programme CSIRT s'adresse aux équipes techniques pour la surveillance avancée des réseaux.
Description
Un atelier d’une journée, axé sur la sécurisation avancée du web.
Cours
Surveillance des réseaux et analyse du trafic (niveau supérieur)
Résumé
La surveillance des réseaux est un moyen parmi d’autres pour comprendre ce qui se passe sur un réseau. Cette session a pour objet les connaissances de base que nous devons avoir concernant la surveillance des réseaux et leurs problèmes (exemple : problèmes légaux, vie privée, chiffrage, réseaux cachés, etc.). Le cours de formation offre des sessions pratiques aux participants pour les analyses du trafic généré par malware, botnet et d’autres outils malveillants.
Introduction
The Computer Security Incident Response Team (CSIRT) training course aims to develop the knowledge and skills of staff members of a CSIRT or those interested in joining such a team, or involved in creating such a team.
Pre-requisites
Trainees are typically experienced system, network or IT managers (Interested persons from other backgrounds are welcome to contact the organisers to discuss the suitability of the course for them). They are expected to have an awareness of the security issues involved in connecting computers to the Internet. They must be committed to using their skills to improve the security of computers and networks. For the technical side of the course, familiarity with the normal operation of TCP/IP networks, addresses, port numbers and protocols will be assumed.
The following modules are covered:
CSIRT Organization
Describes how CSIRTs fit into their organisations: planning the CSIRT, defining the constituency of the team and gaining management authority for it, deciding the services the team will offer, working with those outside the organisation, staffing the CSIRT, funding. Participants will discuss their own organisation and how their team fits into it.
Technical Introduction
A basic introduction to the main attack vectors that malicious parties use to attack systems: intruders and their motivations, botnets, network protocols and how they can be abused, operating systems and services, types of vulnerability, information gathering, breaking in, hiding traces, denial-of-service attacks.
CSIRT Operations
Describes the facilities, systems and tools needed by CSIRTs to operate successfully: housing the CSIRT, equipment, e-mail, remote access, information and contacts, servers and networks, incident response plans and procedures, tracking systems. As an exercise participants will discuss and develop incident response plans for their own teams.
Legal Issues
A high level overview of the areas of legislation that are likely to affect CSIRTs in their work and that team members need to be aware of: origins of computer legislation, problems, data protection, computer misuse, working with law enforcement, monitoring, evidence, European developments.