Course material and slides
Lessons learned from the field and deep dive into good practice of log analysis, and general overview of digital forensics techniques, two key components of an efficient incident management system.
References and further reading
Threat landscape references:
IoT (in-)security references:
- Smart & Secure IoT awareness portal
- Marie Moe about pacemaker security
- ENISA on IoT and smart infrastructures
CYBERSECURITY Luxembourg references: