Settings saved

Data protection

In order to optimise the design of our website for you and to continuously improve it, we use analysis tools from third-party providers. Cookies, tracking and (re-)targeting technologies are only used after you have given your express consent.

Training

It is important for administrators to know the correct procedures and functional principles for daily operation of the honeyBox®.
Analyzing and tracking attacks is also an essential aspect of using the appliance.

That's why secXtreme offers training for honeyBox® administrators.

Contents:

  • Installing the honeyBox as a software and hardware appliance
  • System monitoring functions
  • Backup and restore Recovery
  • System security
    • Local firewall
    • Security baselining
    • Filesystem integrity check
    • Read-only file systems
  • Rescue mode
  • Alerting system
  • Log file management
  • Updates (via internet and update server)
  • Database management
  • Database backup and restore
  • Configuration of virtual honeypots
    • Use in various network architectures
    • Routing in multi-homed scenarios
    • Configuration adjustments
    • Advanced logging
    • Creation of new templates Functionality of service modules
  • Typical attacks and how they are detected
  • Network integration
  • Actively attacking virtual honeypots with port scanners and vulnerability scanners
  • Evaluation of log messages and alarms
  • Integration of messages into third-party systems
  • Procedures for detected attacks Support

The training can be held either in-house at your location or at ours. Ottobrunn near Munich.