{"id":888,"date":"2013-10-12T07:49:07","date_gmt":"2013-10-12T07:49:07","guid":{"rendered":"https:\/\/www.africacert.org\/home\/?page_id=333"},"modified":"2013-10-12T07:49:07","modified_gmt":"2013-10-12T07:49:07","slug":"africacert-v","status":"publish","type":"page","link":"https:\/\/www.africacert.org\/home\/africacert-v\/","title":{"rendered":"AfricaCERT V"},"content":{"rendered":"\n\t\t<div class='et_slidecontent'>\n\t\t\t<a title=\"First\" href=\"http:\/\/www.first.org\/newsroom\/releases\/20131219\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-172 aligncenter\" alt=\"partner-first\" src=\"https:\/\/www.africacert.org\/home\/home\/wp-content\/uploads\/2013\/06\/partner-first.jpg\" width=\"400\" height=\"200\" \/><\/a><\/p>\n<p><strong>November 24 \u2013 25: Forum of Incident Response and Security Teams \u2013 Transits I training\n<\/strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p><strong>Course Summary<\/strong><\/p>\n<p>The CSIRT training course aims to develop the knowledge and skills that are needed by staff who are members of a Computer Security Incident Response Team, who will join such a team, or who are involved in creating such a team.<\/p>\n<p><strong>Pre-requisites<\/strong>\nTrainees are typically experienced system, network or IT managers. (Interested persons from other backgrounds are welcome to contact the organizers to discuss the suitability of the course for them). They are expected to have an awareness of the security issues involved in connecting computers to the Internet. They must be committed to using their skills to improve the security of computers and networks. For the technical side of the course, familiarity with the normal operation of TCP\/IP networks, addresses, port numbers and protocols will be assumed.\nThe following modules are covered:<\/p>\n<p><strong>CSIRT Organization<\/strong>\nDescribes how CSIRTs fit into their organizations: planning the CSIRT, defining the constituency of the team and gaining management authority for it, deciding the services the team will offer, working with those outside the organization, staffing the CSIRT, funding. Students will discuss their own organization and how their team fits into it.<\/p>\n<p><strong>Technical Introduction<\/strong>\nA basic introduction to the main attack vectors that malicious parties use to attack systems: intruders and their motivations, botnets, network protocols and how they can be abused, operating systems and services, types of vulnerability, information gathering, breaking in, hiding traces, denial-of-service attacks.<\/p>\n<p><strong>CSIRT Operations<\/strong>\nDescribes the facilities, systems and tools needed by CSIRTs to operate successfully: housing the CSIRT, equipment, e-mail, remote access, information and contacts, servers and networks, incident response plans and procedures, tracking systems. As an exercise students will discuss and develop incident response plans for their own teams.<\/p>\n<p><strong>Legal Issues\n<\/strong>A high level overview of the areas of legislation that are likely to affect CSIRTs in their work and that team members need to be aware of: origins of computer legislation, problems, data protection, computer misuse, working with law enforcement, monitoring, evidence.<\/p>\n<p><strong>How to Apply:<\/strong><\/p>\n<p>In order for your application to be processed efficiently, we request that you send your application to project(at)africacert.org with:\n&#8211; in the subject : africacert V &#8211; Forum of Incident Response and Security Teams Training.\n&#8211; providing the information specified below:<\/p>\n<p>*** Full Name, address and short description (maximum 200 words) of the organization by which the applicant is employed.<\/p>\n<p>Note: It is very important that you provide us with your personal institutional email address and not a generic one or an online service.\nThis is to ensure good communications and to verify the validity of the application.<\/p>\n<p>*** Name, job title, postal address, phone and fax number and e-mail address of the person at management level within this organization who supports the application and can provide more information about the applicant.<\/p>\n<p>*** Team Information (if team in operation); contact information and Charter according to RFC 2350 &#8211;  (http:\/\/www.ietf.org\/rfc\/rfc2350.txt)<\/p>\n<p><strong>NOTE: <\/strong>\nApplications will be accepted on a FIRST-COME-FIRST-SERVED basis.<\/p>\n<p>Selection criteria will include the education and experience of the applicants, the contribution that they will be able to make to the overall security of the Internet. The workshop organizers may ask advice on the applications from the managers of the applicants and from appropriate members of the African Internet community.<\/p>\n\t\t<\/div>\n<p style=\"text-align: center;\">\n\t\t<div class='et_slidecontent'>\n\t\t\t<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-464\" alt=\"jp_krcert\" src=\"https:\/\/www.africacert.org\/home\/wp-content\/uploads\/2013\/10\/jp_krcert.jpg\" width=\"568\" height=\"172\" srcset=\"https:\/\/www.africacert.org\/home\/wp-content\/uploads\/2013\/10\/jp_krcert.jpg 568w, https:\/\/www.africacert.org\/home\/wp-content\/uploads\/2013\/10\/jp_krcert-480x145.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 568px, 100vw\" \/>\n<strong>November 26 \u2013 APday: Training with JPCERT and KrCERT<\/strong>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;\nThis is one day training course on Network Monitoring and Traffic Analysis (Advanced)<\/p>\n<p>CSIRT training for technical staff: advanced network monitoring<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>This is a one day workshop focusing on Network Monitoring and Traffic Analysisy.<\/p>\n<p><strong>Course<\/strong><\/p>\n<p>Network Monitoring and Traffic Analysis (Advanced)<\/p>\n<p><strong>Abstract<\/strong><\/p>\n<p>Network monitoring is one of the ways to understand what is happening within the network. This session will cover the basic knowledge of network monitoring and issues that we should know (Ex: legal issues, privacy issues, encryption, covert channel, etc.). This training course provide participants hands-on experience on analyzing traffic generated by malware, botnet and other malicious tools.<\/p>\n\t\t<\/div><\/p>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p style=\"text-align: center;\"><strong>November 27 \u2013 AfricaCERT Cybersecurity Day. (Hosted by CICERT)<\/strong><\/p>\n<table width=\"100%\" border=\"0\" cellspacing=\"2\" cellpadding=\"2\">\n<tbody>\n<tr>\n<td><strong>Agenda<\/strong><\/td>\n<\/tr>\n<tr>\n<td>08:00\u201309:00 Registration<\/td>\n<\/tr>\n<tr>\n<td>09:00\u201312:30 Morning Session<\/td>\n<\/tr>\n<tr>\n<td>9:00 \u2013 10:30 Session 1: Opening<\/td>\n<\/tr>\n<tr>\n<td>Dr Nii Quaynor Welcome Address &#8211; AfricaCERT Update<\/td>\n<\/tr>\n<tr>\n<td>M. Jean Robert Hountomey &#8211; AfricaCERT Update<\/td>\n<\/tr>\n<tr>\n<td>M. Koichiro Komiyama Toward global recognition (JPCERT) &#8211; AfricaCERT Report 2013<\/td>\n<\/tr>\n<tr>\n<td>Ms. Jinsook Kim (KISA\/KrCERT) &#8211; Introduction of Kisa<\/td>\n<\/tr>\n<tr>\n<td>M. Benoit Morel The Cyber threat: the most complex threat against modern societies what can we do about it? A role for AfricaCERT<\/td>\n<\/tr>\n<tr>\n<td><strong>Questions.<\/strong><\/td>\n<\/tr>\n<tr>\n<td>10:30\u201311h Coffee Break<\/td>\n<\/tr>\n<tr>\n<td><strong>11h &#8211; 12:30 Session 2<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Dr. Samir Abdel Gawad (EGCERT) &#8211; A Real Time Approach for malicious detection<\/td>\n<\/tr>\n<tr>\n<td>M. Mouhamed Diop (AfriRegister \/ Kheweul) &#8211; AfriRegister &amp; AfricaCERT: Partnership for a common Agenda<\/td>\n<\/tr>\n<tr>\n<td>M. Valdes Nzali &#8211; Collaboration Between Infosec Community and CERT Teams Project Sonar case<\/td>\n<\/tr>\n<tr>\n<td>M. Jacques Houngbo &#8211; AfricaCERT Membership Model<\/td>\n<\/tr>\n<tr>\n<td><strong>Questions<\/strong><\/td>\n<\/tr>\n<tr>\n<td>12:30 &#8211; 13:30 Lunch Break<\/td>\n<\/tr>\n<tr>\n<td><strong>13:30 \u2013 15:00 Session 3: <\/strong><\/td>\n<\/tr>\n<tr>\n<td>Me A. CISSE &#8211; La lutte contre la cybercriminalit\u00e9: textes et pratiques au Senegal<\/td>\n<\/tr>\n<tr>\n<td>Colonel F. Ouedraogo &#8211; Le Burkina-Faso et la lutte contre la cybercriminalit\u00e9 : exp\u00e9riences et perspectives<\/td>\n<\/tr>\n<tr>\n<td>Lt de Police Papa Gueye &#8211; L&#8217;Intervention polici\u00e8re dans la lutte contre la cybercriminalit\u00e9 au S\u00e9n\u00e9gal, une exp\u00e9rience de terrain \u00bb,<\/td>\n<\/tr>\n<tr>\n<td>M. Ernest Bokar &#8211; Pesentation du CICERT<\/td>\n<\/tr>\n<tr>\n<td><strong>Questions<\/strong><\/td>\n<\/tr>\n<tr>\n<td>15:00 &#8211; 15:30 Cofee Break<\/td>\n<\/tr>\n<tr>\n<td><strong>15:30 &#8211; 17:00 Session 4<\/strong><\/td>\n<\/tr>\n<tr>\n<td>M. Jean Robert Hountomey &#8211; FIRST Presentation<\/td>\n<\/tr>\n<tr>\n<td>M. David Crochemore &#8211; Presentation de l\u2019ANSSI France<\/td>\n<\/tr>\n<tr>\n<td>M. Abdul-Hakeem Ajijola &#8211; OIC-CERT Presentation<\/td>\n<\/tr>\n<tr>\n<td>M. Abdul-Hakeem Ajijola &#8211; Computer Emergency Readiness and Response (CERRT) in ng Panel AfricaCERT Way forwards and Open Discussions<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\t\t<\/div><br \/>\n[end_tabset]<\/p>\n<p>Views: 2<\/p>","protected":false},"excerpt":{"rendered":"<p>[end_tabset] Views: 2<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-888","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.africacert.org\/home\/wp-json\/wp\/v2\/pages\/888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.africacert.org\/home\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.africacert.org\/home\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.africacert.org\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.africacert.org\/home\/wp-json\/wp\/v2\/comments?post=888"}],"version-history":[{"count":0,"href":"https:\/\/www.africacert.org\/home\/wp-json\/wp\/v2\/pages\/888\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.africacert.org\/home\/wp-json\/wp\/v2\/media?parent=888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}