Workshop on "Botnet Attacks and Defenses" on October 26, 2007 |
A one day Workshop on "Botnet Attacks and Defenses" was conducted on October 26, 2007. The focus of this workshop was to understand various Botnet Attacks and solutions to mitigate these attacks. Delegates from Government, public sector organisations and ISPs participated in the Workshop. |
[Presentation Material] |
|
Workshop on "Vulnerability Assessment Methodologies" on October 16, 2007 |
CERT-In conducted a one day workshop on "Vulnerability Assessment Methodologies" on 16 October, 2007. The objective of the workshop was to understand process and technique of vulnerability assessment for IT systems. The interactive workshop included hands-in sessions for understanding systematic approach to conduct vulnerability assessment in an organizational network. |
[Presentation Material] |
|
Workshop on "Security aspects related to setting up SWAN" on April 30, 2007 |
A one day Workshop on "Security aspects related to setting up SWAN" was conducted on April 30, 2007. The focus of this workshop was to understand various security aspects related to design/setting up SWAN. Casestudies on security implementations in organizational network. |
[Presentation Material] |
|
Workshop on "Information Security Executives Readiness Training Programme for CISOs" on February 12, 2007 |
CERT-In in association with Microsoft organised 3 day Training Programme on Information Security Readiness for the Chief Information Security Officers (CISOs) from various Government, Defence, Banking & critical Public Sector organisations. The interactive training programme comprising of group exercises focused on Understanding Information Risks, Protecting Systems & Users, Security Standards & Compliance and Developing an Information Risk Management Plan. |
[Presentation Material] |
|
Workshop on "Implementing Secure Coding Practices" on January 16, 2007 |
A one day Workshop on "Implementing Secure Coding Practices" was conducted on January 16, 2007. The focus of this workshop was to understand various steps to counter the threats related to web based applications and discuss the issues in developing and maintaining secure web based applications. |
[Presentation Material] |
|