<dd id="rw0xn"></dd>

  • <label id="rw0xn"></label>

  • <sup id="rw0xn"><strike id="rw0xn"></strike></sup><label id="rw0xn"></label>
      <th id="rw0xn"></th>
    1. <var id="rw0xn"></var>
        1. <table id="rw0xn"></table>

          <sub id="rw0xn"><meter id="rw0xn"></meter></sub>
          • English
          • ???????
          • 中文
          • Fran?ais
          • Русский
          • Espa?ol

          Train-the-trainers Course on Conducting Computer Security Incident Response for Nuclear Security

          Nuclear Security Training and Demonstration Centre

          Purpose and objectives

          Provide participants with comprehensive knowledge on how to conduct training courses on computer security incident response planning and implementation in nuclear facilities, based on guidance in IAEA–TDL–005, Computer Security Incident Response Planning at Nuclear Facilities.

          Focus areas

          • Computer security graded approach and defense in depth
          • Computer security incident response planning
          • Computer security incident response roles and responsibilities
          • Detection and analysis
          • Containment, eradication and recovery techniques
          • Incident response reporting
          • Post incident response activities

          Training methods

          • Lecture/Presentation
          • Group discussions
          • Group exercises and presentations
          • Knowledge check

          Specialized equipment/infrastructure to be used

          Training workstations and network infrastructure

          Target audience

          Computer security trainers, information technology professionals, senior technical staff, managers in nuclear facilities and representatives from regulatory bodies who are involved in or transitioning to roles responsible for developing and delivering computer security incident response training programmes at the national level.

          Prerequisites

          Completion of the following IAEA e-learning modules is recommended:

          • Security of Nuclear Information
          • Nuclear Security Threats and Risks: Cyber Threats
          • Introduction to Computer Security for Nuclear Security Practitioners
          • Conducting Computer Security Assurance Activities

          Duration

          5 days

          Stay in touch

          Newsletter

          <dd id="rw0xn"></dd>

        2. <label id="rw0xn"></label>

        3. <sup id="rw0xn"><strike id="rw0xn"></strike></sup><label id="rw0xn"></label>
            <th id="rw0xn"></th>
          1. <var id="rw0xn"></var>
              1. <table id="rw0xn"></table>

                <sub id="rw0xn"><meter id="rw0xn"></meter></sub>
                97碰成人国产免费公开视频