Material educativo de la mano de la Agencia Europea de Redes y Seguridad de la Información (ENISA)
ENISA (European Network and Information Security Agency), desde el 2008 ha ido publicando una serie de ejercicios prácticos para ayudar a aquellos que quieran adquirir los conocimientos de un buen CERT (Computer Emergency Respond Team).
El material está dividido en 29 ejercicios que se corresponden a distintas fases de la respuesta a una incidencia. El material está compuesto por dos documentos: Handbook (documento para el profesor) y el Toolset (documento para el alumno). Además de estos, dispones de varias máquinas virtuales en las que tienes el sistema ya preparado para llevar a cabo las prácticas.
A continuación copio y pego el índice de la web original:
No. | Exercise title | Handbook | Toolset | Virtual Image | Other material supporting the exercise |
---|---|---|---|---|---|
1 | Triage & basic incident handling | Download | Download | Download | Online version of Exercise 1 |
2 | Incident handling procedure testing | Download | Download | Online version of Exercise 2 | |
3 | Recruitment of CERT staff | Download | Download | Online version of Exercise 3 | |
4 | Developing CERT infrastructure | Download | Download | Online version of Exercise 4 | |
5 | Vulnerability handling | Download | Download | Online version of Exercise 5 | |
6 | Writing security advisories | Download | Download | Online version of Exercise 6 | |
7 | Network forensics | Download | Download | Online version of Exercise 7 | |
8 | Establishing external contacts | Download | Download | Online version of Exercise 8 | |
9 | Large scale incident handling | Download | Download | Online version of Exercise 9 | |
10 | Automation in incident handling | Download | Download | Online version of Exercise 10 | |
11 | Incident handling in live role playing | Download | Download | Online version of Exercise 11 | |
12 | Cooperation with Law Enforcement agencies | Download | Download | Online version of Exercise 12 | |
13 | Incident handling during an attack on Critical Information Infrastructure | Download | Download | ||
14 | Proactive incident detection | Download | Download | ||
15 | Cost of ICT incident | Download | Download | Download MS Excel workbook, Download workbook in open format | |
16 | Mobile threats incident handling | Download | Download | ||
17 | Incident handling in the cloud | Download | Download | ||
18 | Advanced Persistent Threat incident handling | Download | Download | ||
19 | CERT participation in incident handling related to the Article 13a obligations | Download | Download | Download data_ddos.pcap | |
20 | CERT participation in incident handling related to the Article 4 obligations | Download | Download | ||
21 | Assessing and Testing Communication Channels with CERTs and all their stakeholders | Download | Download | ||
22 | Social networks used as an attack vector for targeted attacks | Download | Download | ||
23 | Honeypots | Download | Download | Download | |
24 | Digital forensics | Download | Download | Download
|
|
25 | Identification and handling of electronic evidence | Download | Download | ||
26 | Identifying and handling cyber-crime traces | Download | Download | ||
27 | Presenting, correlating and filtering various feeds | Download | Download | Download | |
28 | Incident handling and cooperation during phishing campaign | Download | Download | ||
29 | Cooperation in the Area of Cybercrime | Download | Download |
Si lo prefieres, desde este enlace (PDF) te puedes descargar los documentos del profesor (handbook) y desde aquí (PDF) los del alumno (toolset) en español para los 12 primeros ejercicios.
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec