Thematic CERN School of Computing on Security 2025
from
Sunday 6 April 2025 (11:00)
to
Saturday 12 April 2025 (11:00)
Sunday 6 April 2025
15:00
Registration
Registration
15:00 - 17:00
17:00
Welcome to the CERN School of Computing
Welcome to the CERN School of Computing
17:00 - 17:20
17:20
Self-presentation: 1 minute per person
Self-presentation: 1 minute per person
17:20 - 18:00
Monday 7 April 2025
09:00
Opening Session
-
Sebastian Lopienski
(
CERN
)
Alberto Pace
(
CERN
)
Opening Session
Sebastian Lopienski
(
CERN
)
Alberto Pace
(
CERN
)
09:00 - 09:45
09:45
Security in research and scientific computing
-
Stefan Lueders
(
CERN
)
Security in research and scientific computing
Stefan Lueders
(
CERN
)
09:45 - 10:45
* computer security: past, present and future * current risk landscape * most common threats and attack vectors * "why are we here?"
10:45
Announcements
Announcements
10:45 - 11:00
11:00
Coffee break
Coffee break
11:00 - 11:30
11:30
Identity, authentication, authorisation
-
Tom Dack
Identity, authentication, authorisation
Tom Dack
11:30 - 12:30
• An introduction to the concepts of Identity, Authentication, and Authorization • Authentication and authorisation for distributed research • Methods for communicating authentication and authorization: Certificates, SAML, OAuth • How these technologies fit within research infrastructures
12:30
Lunch
Lunch
12:30 - 13:15
13:15
Study time and/or daily sports
Study time and/or daily sports
13:15 - 14:45
14:45
Security architecture fundamentals
-
Barbara Krašovec
(
IJS
)
Security architecture fundamentals
Barbara Krašovec
(
IJS
)
14:45 - 15:45
Security architecture fundamentals • fundamental security principles • develop skills to be a security architect • how to design and provide secure computing infrastructure • security standards and frameworks • physical security • network security: segmentation, firewalls, VPNs
16:00
Coffee break
Coffee break
16:00 - 16:15
16:15
Security operations - lecture 1
-
Sven Gabriel
Security operations - lecture 1
Sven Gabriel
16:15 - 17:15
* security operations: history, CERT vs. CSIRT * CSIRT organisation and provided services * preparations: asset management, security monitoring etc. * incident response readiness * lessons learned from past incidents
17:15
Security operations - lecture 2
-
Sven Gabriel
Security operations - lecture 2
Sven Gabriel
17:15 - 18:15
* security operations: history, CERT vs. CSIRT * CSIRT organisation and provided services * preparations: asset management, security monitoring etc. * incident response readiness * lessons learned from past incidents
18:15
Network design - exercise
-
Barbara Krašovec
(
ISJ
)
Network design - exercise
Barbara Krašovec
(
ISJ
)
18:15 - 19:15
19:15
Dinner at Cosener´s house
Dinner at Cosener´s house
19:15 - 20:00
Tuesday 8 April 2025
08:45
Virtualisation and cloud security
-
Barbara Krašovec
(
IJS
)
Virtualisation and cloud security
Barbara Krašovec
(
IJS
)
08:45 - 09:45
Virtualisation and cloud security • virtualisation security fundamentals • cloud service models • authentication and key management • data security in the cloud • DevSecOps • security in private and public cloud • common threats in the cloud • security tools
09:45
Risk and vulnerability management
-
Sven Gabriel
Risk and vulnerability management
Sven Gabriel
09:45 - 10:45
* risk analysis and risk mitigation * vulnerability lifecycle, monitoring, scanning * CVE, CVSS, CPE, CWE and related standards * special cases: vulnerable hardware, EOL systems etc.
10:45
Announcements
Announcements
10:45 - 11:00
11:00
School photo
School photo
11:00 - 11:05
11:05
Coffee break
Coffee break
11:05 - 11:30
11:30
Logging and traceability
-
David Crooks
(
UKRI STFC
)
Logging and traceability
David Crooks
(
UKRI STFC
)
11:30 - 12:30
* host-based logs (system and application level), network monitoring * the importance of central logging * tools and technologies * data privacy, dealing with personal and sensitive data, log retention * traceability challenges
12:30
Lunch
Lunch
12:30 - 13:15
13:15
Study time and/or daily sports
Study time and/or daily sports
13:15 - 14:45
14:45
Intrusion detection with SOC: threat intelligence, monitoring, integration and processes
-
David Crooks
(
UKRI STFC
)
Intrusion detection with SOC: threat intelligence, monitoring, integration and processes
David Crooks
(
UKRI STFC
)
14:45 - 15:45
* indicators of compromise (IoCs), threat intelligence sharing, TLP protocol * tools and technologies: MISP, Zeek, OpenSearch etc. * deploying a Security Operation Center * security incidents: detecting and alerting
15:45
Coffee break
Coffee break
15:45 - 16:15
16:15
Student lightning talks
Student lightning talks
16:15 - 17:15
17:15
Introduction to web penetration testing
-
Sebastian Lopienski
(
CERN
)
Introduction to web penetration testing
Sebastian Lopienski
(
CERN
)
17:15 - 18:15
* web application security, typical web vulnerabilities * ethical hacking * introduction to pentesting
18:15
Penetration testing - exercises
-
Sebastian Lopienski
(
CERN
)
Penetration testing - exercises
Sebastian Lopienski
(
CERN
)
18:15 - 19:15
19:15
Dinner at Cosener´s house
Dinner at Cosener´s house
19:15 - 20:00
Wednesday 9 April 2025
08:45
Container security
-
Daniel Kouřil
(
CESNET
)
Container security
Daniel Kouřil
(
CESNET
)
08:45 - 09:45
* key concepts of containers (namespaces, cgroups etc.) and Docker * container security, threat landscape * vulnerability and patch management
09:45
Container security - exercises
-
Daniel Kouřil
(
CESNET
)
Container security - exercises
Daniel Kouřil
(
CESNET
)
09:45 - 10:45
10:45
Announcements
Announcements
10:45 - 11:00
11:00
Coffee break
Coffee break
11:00 - 11:30
11:30
Intrusion detection with SOC: deployment and operation
-
David Crooks
(
UKRI STFC
)
Intrusion detection with SOC: deployment and operation
David Crooks
(
UKRI STFC
)
11:30 - 12:30
* indicators of compromise (IoCs), threat intelligence sharing, TLP protocol * tools and technologies: MISP, Zeek, OpenSearch etc. * deploying a Security Operation Center * security incidents: detecting and alerting
12:30
Lunch
Lunch
12:30 - 13:15
13:15
Oxford excursion and dinner
Oxford excursion and dinner
13:15 - 20:45
Thursday 10 April 2025
08:45
Digital forensics: essentials and data acquisition
-
Daniel Kouřil
(
CESNET
)
Digital forensics: essentials and data acquisition
Daniel Kouřil
(
CESNET
)
08:45 - 09:45
digital evidence handling data acquisition (live systems, storage etc.) data analysis (OS, file system, network, executables etc.) reporting
09:45
Defensible security architecture: how to implement security principles
-
Barbara Krašovec
(
IJS
)
Defensible security architecture: how to implement security principles
Barbara Krašovec
(
IJS
)
09:45 - 10:45
• data security • endpoint security: hardware, host, OS, BMC security, system hardening • application security • future security trends
10:45
Announcements
Announcements
10:45 - 11:00
11:00
Coffee break
Coffee break
11:00 - 11:30
11:30
Digital forensics: data analysis
-
Daniel Kouřil
(
CESNET
)
Digital forensics: data analysis
Daniel Kouřil
(
CESNET
)
11:30 - 12:30
12:30
Lunch
Lunch
12:30 - 13:15
13:15
Study time and/or daily sports
Study time and/or daily sports
13:15 - 14:45
14:45
Incident response management
-
Barbara Krašovec
(
IJS
)
Incident response management
Barbara Krašovec
(
IJS
)
14:45 - 15:45
• incident management and coordination • incident analysis and investigation • communication with stakeholders • containment and eradiction • recovery • lessons learnt
15:45
Coffee break
Coffee break
15:45 - 16:15
16:15
Intrusion detection with SOC and AAI - exercises
-
Tom Dack
David Crooks
(
UKRI STFC
)
Intrusion detection with SOC and AAI - exercises
Tom Dack
David Crooks
(
UKRI STFC
)
16:15 - 19:00
* indicators of compromise, threat intelligence sharing, TLP protocol * tools and technologies * deploying a Security Operation Center * detecting security incidents
19:15
Dinner at Cosener´s house
Dinner at Cosener´s house
19:15 - 20:00
Friday 11 April 2025
08:45
Digital forensics - exercises
-
Daniel Kouřil
(
CESNET
)
Digital forensics - exercises
Daniel Kouřil
(
CESNET
)
08:45 - 10:15
10:15
Coffee break
Coffee break
10:15 - 10:30
10:30
Introduction to forensics - exercises
-
Daniel Kouřil
Introduction to forensics - exercises
Daniel Kouřil
10:30 - 11:45
11:45
Announcements
Announcements
11:45 - 12:00
12:00
Penetration testing - exercise debriefing
-
Sebastian Lopienski
(
CERN
)
Penetration testing - exercise debriefing
Sebastian Lopienski
(
CERN
)
12:00 - 12:30
12:30
Lunch
Lunch
12:30 - 13:15
13:15
Study time
Study time
13:15 - 14:15
14:15
Exam
Exam
14:15 - 15:00
15:00
Incident response - exercise
-
Romain Wartel
(
CERN
)
David Crooks
(
UKRI STFC
)
Tom Dack
Sebastian Lopienski
(
CERN
)
Incident response - exercise
Romain Wartel
(
CERN
)
David Crooks
(
UKRI STFC
)
Tom Dack
Sebastian Lopienski
(
CERN
)
15:00 - 16:30
* incident management and coordination * Sirtfi and trust frameworks * communication with local users, external communities, and other stakeholders * working with law enforcement * privacy aspects
16:30
Coffee break
Coffee break
16:30 - 16:45
16:45
Incident response - exercise
-
Sebastian Lopienski
(
CERN
)
Tom Dack
David Crooks
(
UKRI STFC
)
Romain Wartel
(
CERN
)
Incident response - exercise
Sebastian Lopienski
(
CERN
)
Tom Dack
David Crooks
(
UKRI STFC
)
Romain Wartel
(
CERN
)
16:45 - 18:00
* incident management and coordination * Sirtfi and trust frameworks * communication with local users, external communities, and other stakeholders * working with law enforcement * privacy aspects
18:00
Closing Session
-
Alberto Pace
(
CERN
)
Closing Session
Alberto Pace
(
CERN
)
18:00 - 18:45
19:30
Outside Closing Dinner
Outside Closing Dinner
19:30 - 21:15
Saturday 12 April 2025
08:45
Departure
Departure
08:45 - 10:45