Abuse desk training best practice

This course will comprise of the following:

  • What is abuse?
  • Define on network and off network abuse
  • Best Practice
  • Possible ways to manage abuse
  • Where to get information for on-network “abuse”
  • Common Problems
    • Blacklisting
    • Spam
    • Virus
    • Comprised Servers / Hacked Servers / Defacements Sites
    • Suspending of services
  • Q&A
    • Cover any matters that current attendees may have and see what can and can’t be done.

Presentation

Abuse Desk training – Best Pratice (pdf)