Skip to content
Membership
How to Become Member
Operational Member
Supporting Members
Individual Members
Co-Founders
African Teams
Code Of Conduct
Points of Contact
Information Exchange Policy
Hosting AfricaCERT Events
Resources
First Ressources
Education
Best Practices
Transits Materials
ENISA Materials
CIRCL LU Toolings
General Incident Response stuffs
Internet Infrastructure Security Guidelines for Africa [IISGA]
Cyber Security Trends and Government Responses in Africa [AU-SYMANTEC]
African Union Convention on Cyber Security and Personal Data Protection
Norms and Frameworks
Activities
Trainings with JPCERT
Trainings with AAF
Collaboration with FIRST
Meetings and Activities Reports
Remote Reunions
Events
Upcoming AfricaCERT official online CISSP CBK with ISC2
API Security Challenge
About AfricaCERT
History
Where we come from
The premises
The Kigali Declaration
Mission Statement
Structure
Media Releases
Friends of AfricaCERT
Security-thanks
Contact Us
Search this website
Menu
Close
Membership
How to Become Member
Operational Member
Supporting Members
Individual Members
Co-Founders
African Teams
Code Of Conduct
Points of Contact
Information Exchange Policy
Hosting AfricaCERT Events
Resources
First Ressources
Education
Best Practices
Transits Materials
ENISA Materials
CIRCL LU Toolings
General Incident Response stuffs
Internet Infrastructure Security Guidelines for Africa [IISGA]
Cyber Security Trends and Government Responses in Africa [AU-SYMANTEC]
African Union Convention on Cyber Security and Personal Data Protection
Norms and Frameworks
Activities
Trainings with JPCERT
Trainings with AAF
Collaboration with FIRST
Meetings and Activities Reports
Remote Reunions
Events
Upcoming AfricaCERT official online CISSP CBK with ISC2
API Security Challenge
About AfricaCERT
History
The premises
The Kigali Declaration
Mission Statement
Structure
Media Releases
Friends of AfricaCERT
Security-thanks
Contact Us
Leave a Reply
Cancel reply
You must be
logged in
to post a comment.