|
Telco technical & business courses available worldwide |
Who Should Attend?
The workshop is intended for IT systems administrators and IT security incident responders.
Course Content
The aim of the exercise is to develop proper habits and practice in handling incidents defending against attacks targeting IT infrastructure. Participants will be given an existing infrastructure containing a web server, mail server, file server, DNS server, etc., which they must defend using various defense techniques. They will be required to properly protect infrastructure, detect attacks, and make rapid decisions related to the current threat. The participants' group-work and problem-solving abilities will also be evaluated. The teams will be evaluated throughout the exercise in order to assess the effectiveness of each action. The exercise ends with presentation of team results and additional discussion.
This exercise consists of group of challenges. In each challenge participants have to solve a problem, analyse code/data or find information. After completing each challenge, participants answer control questions or find hidden flags. Various tasks require different sets of skills to complete – network analysis skills, information gathering, data/log analysis, and/or reverse engineering. Not all challenges will be available from the start. The challenges focus on attacks on a telecom operator, a bank or financial institution (the company) and its clients. The exercise aims to test cybersecurity teams: how they are capable of dealing with real-life attacks and scenarios. To complete some of the challenges, malware analysis labs are necessary (one challenge involves analysis of a real malware sample). There will be six challenges, but information about them should NOT be disclosed to the participants -- it is available on request for organisers.
Course Objectives
Detecting, understanding, and reacting to live vulnerability exploitation on a dedicated infrastructure.
Prerequisites and Requirements
All participants must have access to the Internet. For a group of up to 50 participants, a bandwidth of 20 Mbps is recommended. Participants in the exercises are requested to prepare a computer environment in which they will be able to analyse malware designed for Windows OS (preferably in an isolated, secure environment, e.g. virtual machines). There must be at least one environment for each exercise group. We also recommend participants have Linux OS for other types of analysis. We recommend using the following ENISA exercise to prepare the environment: https://www.enisa.europa.eu/activities/cert/training/training-resources/technical-operational#building
Training structure
4-day session: 2-day CERT Games training and 2-day CERT exercises.
Methodology
Instructor-led workshop. In a learning set-up designed by experts in the field, you will work in teams and practice different security skills.
Really practical and very fruitful training.
Highly professional trainer with lots of practical experience. Friendly and open.
I can proudly recommend these courses for others as well.
Trainer is open for comments and discussion.
The trainer is capable of answering all my questions.
Great teacher with deep knowledge and experience.
Good class notes and great examples.
Experienced trainer. Excellent descriptions.
This course will be very useful in my daily work.
Training provides useful methods to analyze real protocols.
Trainer adapted to the expectations of the audience.
Trainer understands local market experience.
Perfect course.
Regardless of technology I received theoretical and practical answers.
Trainer was able to answer practical questions.
I received a lot of useful information which I use in my work every day.
Very clear explanations.
Course covers all important issues and presents relevant examples.
More than excellent course!
Excellent, knowledgeable trainer, open to communication.
Unique training covering the most important areas of my work.
The best training ever.
Excellent knowledge from the trainer.
Professional, high-quality trainer.
The course exceeded my expectations. Hats off!
I am very impressed with the trainer's knowledge and experience.
Experienced trainer. Real cases with references to recommendations.
Overwhelming knowledge and expertise. Interactive and enjoyable learning.
A clear picture of GSM switching and signalling.
Excellent exercises!
Training was above expectations!
The course covers all the impacted areas.
Trainer understands local market experience.
Very effective training methods.
Many different people from different operators can share their problems and ideas.
I feel like the trainer is the best professor and mentor one can have.
Amazing, more than excellent, audience-oriented trainer.
A lot of useful materials and knowledge.
Good logical structure of the course and explanation.
Very well organized training programmes.
Trainers have passion to teach & impart knowledge.
Excellent methodology of teaching. Simple and easy to understand training.
Excellent course and instructor.
The training is completely excellent.
Good direct connection between course material and real problems.
Deep and detailed topic analysis.
The training exceeded my expectations.
A good approach to a complex problem.
Seminar entirely for Telecommunication operators. A lot of issues covered.
Everyone gets individual attention from the trainer.
The whole course was very valuable.