• Kilimahewa Road,House No.2,UDSM

  • helpdesk@ternet.or.tz

  • +255222775378

Thumb

Offensive security training for academia sectoral cert members

Tanzania Computer Emergency Response Team (TZ-CERT) was established under section 124 of the Electronic and Postal Communications Act (EPOCA) no 3/2010 within the structure of the Tanzania Communications Regulatory Authority (TCRA). TZ-CERT is designated to serve a wide range of public and private institutions termed as TZ-CERT constituency members.

 IMPORTANT NOTES 

  1. The Phase two (2) four (4) days hands-on practice workshop based on Offensive security training for academia sectoral cert members from 19th to 22nd December, 2022 at the University of Dodoma
  2. Registration is now opened from 30th November to 10th December 2022.
  3. Nominate and encourage your technical staff to register as early as possible because class capacity is strictly 25 and participants are taken on first come first served basis. Nominees should register here for Cyber Security Training workshop phase two.
  4. Remember participation for this workshop is FREE.
  5. Nominating institution will be responsible for transportation and accommodation of their participants.
  6. Invitation letters will be sent to registered applicants only.

THEME

This workshop succeeds after the phase one workshop on cybersecurity based on Intrusion Detection that would be conducted at the Institute of Accountancy Arusha (IAA). Trainers rom TERNET and TCRA will conduct the phase two (2) four (4) days hands-on practice workshop based on Offensive security training for academia sectoral cert members

GOAL

In order to realize the preferred outcomes of this training, we encourage you to nominate participants from your ICT technical office especially the ones that attended the Cyber security workshop in Arusha so they can learn the full spectrum of Cyber security best practices from detection, intrusion and offensive techniques.

TRAINING OBJECTIVES

  • Increase the awareness of security
  • Reduce attack surface of systems
  • Explore different data protection principles
  • Implement login security and other identity management solutions
  • Explore current malware threats and anti-malware solutions
  • Explore social engineering threats, methods, and techniques
  • Examine software vulnerabilities and security solutions for reducing the risk of exploitation
  • Explain incident response capabilities
  • Identify legal considerations and investigative techniques when it comes to cybersecurity