Agenda
Security Workshop
Time Schedule
Session 1 | 09:00 - 11:00 |
Break | 11:00 - 11:30 |
Session 2 | 11:30 - 13:00 |
Lunch | 13:00 - 14:00 |
Session 3 | 14:00 - 15:30 |
Break | 15:30 - 16:00 |
Session 4 | 16:00 - 18:00 |
Instructors
maz | Yoshinobu (Maz) Matzusaki | Internet Initiative Japan (Link) | Japan |
pappu | Fakrul Alam | Bangladesh Network Operators Group bdNOG (Link) | Bangladesh |
patrick | Patrick Okui | Network Startup Resource Center (Link) | Uganda |
randy | Randy Bush | Internet Initiative Japan (Link) | Japan |
sheryl | Sheryl Hermoso | APNIC (Link) | Australia |
phil | Phil Regnauld | Network Startup Resource Center (Link) | Denmark |
Available reference materials here
Day 1 | Topic | Inst | Presentations |
---|---|---|---|
Session 0 | Intro | randy | 1-0-1 Intro |
- admin | |||
- agenda | |||
- materials and resources | |||
- facilities and wireless | |||
Session 1 | Assets & Threat Models | phil & sheryl | 1-1-1 Threats 1-1-2 Assets and Threats |
- what assets are we protecting? | |||
- from what kinds of attackers? | |||
.. kiddies | |||
.. financial gain | |||
.. nation state (you're dead) | |||
Threat Pragmatics | phil | 1-2 Pragmatics | |
- to network infrastructure (routing, wiretap, ...) | |||
- to service infrastructure (dns, mail, ...) | |||
- to users | |||
Session 2 | Cryptography | phil | 1-3 Cryptography |
- symmetric encryption | |||
- asymmetric encryption | |||
- digital signatures | |||
- hash functions | |||
- certificates & trust anchors | |||
- random number generation | |||
Session 3 | Cryptography Applications / PGP | ||
- gpg | patrick | 1-3-1 PGP :: 2-1-1 PGP Lab | |
Day 2 | |||
Session 1 | GPG/PGP continued | ||
Session 2 | Cryptography Applications | ||
- SSH | randy | 2-2-1 SSH | |
Session 3-4 | Cryptography Applications Cont | ||
- VPNs, IPsec | sheryl | 2-2-2 VPN-IPsec-TLS 2-2-2 IPsec Lab | |
- TLS | |||
Day 3 | |||
Session 1 | Network Infrastructure | ||
- router and switch protection | randy | 2-3-1 Protecting Routers and Switches | |
- DNS Rate Limiting & UDP Attacks | randy | 3-2-4.dns-rate-limit.pdf | |
- filtering at the border | pappu | 2-1-2 Filtering at the Border | |
- configuration & archiving | randy | 2-3-3 Archiving | |
Session 2-3 | Anomaly detection | ||
- Sick Host Detection | patrick | 3-2-1 Sick Hosts | |
- Logging and Monitoring | pappu | 2-3-1 Logging-monitoring | |
- IDS theory | pappu | 2-3-2 IDS Theory | |
- IDS pragmatics - snort | patrick | 3-2-4 Snort Pragmatics | |
- anomaly detection | maz | 2-3-4 Anomalies | |
- firewalls | maz | 2-3-5 Firewalls | |
Session 4 | Network Infrastructure contd. | ||
- Routing Protocol Protection | randy | 2-4-1 Routing Protocols 2-4-1 RPKI-Lab | |
Day 4 | |||
Session 1 | Protecting Hosts from Net | pappu, patrick, phil | 3-1-1 Hosts |
- Host hardening | |||
- Default Services | |||
- Keeping up to date - patching | |||
- Get Patches from the Source | |||
- Mobile Hosts | 3-1-5 Mobile Node Security | ||
Protecting User Hosts | pappu, patrick | ||
- Backup! | |||
- Authentication Credentials | |||
- Authentication Services | |||
- Host-based Firewalls | |||
- Scanning for Diseases | |||
Session 2-3 | DNS | ||
- DNS: auth, slave, cache | phil | 2-4-1 Securing DNS | |
- DNS Server Protection | 2-4-2 DNSSEC | ||
- Providing DNSsec | patrick & randy | 2-4-3 OpenDNSSEC | |
Session 4 | - Validating/Using DNSsec | patrick & phil | 4-4-1 Validating-dns |
Day 5 | |||
Session 1 | Virus, Mail and Browsing | ||
- Anti-virus | maz & randy | 4-1-1 Anti-virus | |
- Safe Mail Practices | maz & randy | 4-1-2 Safer mail | |
- Safe Browsing Practices | maz & randy | 4-1-3 Safer browsing | |
Inter-Host Protocols | |||
- personal encryption of files | pappu | 3-4-1 File encryption | |
- ssh, rsync, sftp, ... | randy | 3-4-2.rsync+sftp.pdf | |
- Covert Channels, VPNS, TOR, Steganography | sheryl | 3-4-3 Covert Channels | |
Session 2 | Plan in Advance | ||
- Host Forensics & Analysis | everyone | 4-1-1 FreeBSD hack | |
- Incident Reporting and Pre-approvals | sheryl | 4-1-3 Incident Reporting | |
- External actors - who to trust (LEO or other) | pappu | 4-3-2 Leo | |
- Wipe, Recover, Replace | maz & sheryl | 4-1-5 Wipe-etc | |
Session 3 | Inter-Network Cooperation | maz | |
- NOGs, CSIRT | 4-2 Inter-network Cooperation | ||
- Security Communities | 4-2-2 Inter-network Cooperation | ||
Planning for the Future | pappu | ||
Session 4 | Atlas Probes | randy | 5-3-1.AtlasProbes.pdf Atlas Probes |
Misc | |||
Support docs | Editors, SSH, ... |
Last modified 5 years ago
Last modified on Mar 11, 2014, 1:28:43 AM
Attachments (41)
- 1-1-1.Threats.pdf (2.1 MB) - added by admin 5 years ago.
- 1-2.Pragmatics.pdf (117.6 KB) - added by admin 5 years ago.
- 1-1-2.threats.pdf (938.6 KB) - added by shane 5 years ago.
- 1-3.crypt.pdf (541.9 KB) - added by admin 5 years ago.
- 1-4-2.VPN_IPsec_TLS.pdf (1.1 MB) - added by shane 5 years ago.
-
1-3-1.pgp.pdf
(228.9 KB) -
added by admin 5 years ago.
pgp preso
-
2-1-1.pgp-lab.html
(40.9 KB) -
added by admin 5 years ago.
pgp lab
- 2-2-2 IPsec Lab.pdf (246.5 KB) - added by shane 5 years ago.
-
2-3-3.archiving.pdf
(422.4 KB) -
added by randy 5 years ago.
RANCID
-
2-2-1.ssh.pdf
(1.2 MB) -
added by randy 5 years ago.
ssh
-
1-0-1.intro.pdf
(115.8 KB) -
added by randy 5 years ago.
intro
- 2-1-2.filtering-at-border.pdf (1.5 MB) - added by fakrul 5 years ago.
-
2-4-1.routing-protocols.pdf
(3.4 MB) -
added by randy 5 years ago.
rpki lecture
-
2-4-1.RPKI-Lab.pdf
(1.4 MB) -
added by randy 5 years ago.
rpki lab
-
3-2-4.dns-rate-limit.pdf
(368.8 KB) -
added by randy 5 years ago.
rate limit
-
4-1-2.safer-mail.pdf
(479.4 KB) -
added by randy 5 years ago.
safer mail
-
4-1-3.safer-browsing.pdf
(2.2 MB) -
added by randy 5 years ago.
safer browsing
-
3-4-2.rsync+sftp.pdf
(247.1 KB) -
added by randy 5 years ago.
rsync sftp
-
3-2-1.sick-hosts.pdf
(264.4 KB) -
added by admin 5 years ago.
sick hosts preso
-
3-2-4.snort.pdf
(1.1 MB) -
added by admin 5 years ago.
snort pragmatics
- 2-3-1.logging-monitoring.pdf (1.8 MB) - added by fakrul 5 years ago.
- 2-3-2.ids.pdf (580.5 KB) - added by fakrul 5 years ago.
- 2-3-4-anomaly.pdf (470.3 KB) - added by maz 5 years ago.
- 2-3-5-firewalls.pdf (451.9 KB) - added by maz 5 years ago.
- 2-3-4.anomaly.pdf (470.3 KB) - added by maz 5 years ago.
- 2-3-5.firewalls.pdf (451.9 KB) - added by maz 5 years ago.
-
2-3-1.rtrs-switches.pdf
(188.2 KB) -
added by randy 5 years ago.
Protecting Routers, Switches, …
- 3-4-3.Covert_Channels.pdf (1.7 MB) - added by shane 5 years ago.
- 4-1-3.IncidentReporting.pdf (112.1 KB) - added by shane 5 years ago.
- 3-1-1.hosts.pdf (2.3 MB) - added by fakrul 5 years ago.
-
2-4-1.Securing_DNS.pdf
(955.8 KB) -
added by shane 5 years ago.
securing DNS
- mobile-security-outline.pdf (176.7 KB) - added by admin 5 years ago.
- 4-1-1.anti-virus.pdf (593.2 KB) - added by maz 5 years ago.
-
4-4-1.validating-dns.pdf
(77.5 KB) -
added by admin 5 years ago.
validating dns
- 4-1-5.wipe-etc.pdf (171.3 KB) - added by maz 5 years ago.
- 4-2.inter-network-cooperation.pdf (1.9 MB) - added by maz 5 years ago.
- 4-2-2.inter-network-cooperation.pdf (878.7 KB) - added by maz 5 years ago.
- Wireshark.pdf (1.1 MB) - added by fakrul 5 years ago.
-
exercise-data.zip
(454.3 KB) -
added by fakrul 5 years ago.
Wireshark Lab
-
2-4-3.opendnssec.pdf
(683.7 KB) -
added by randy 5 years ago.
OpenDNSsec
-
5-3-1.AtlasProbes.pdf
(2.0 MB) -
added by randy 5 years ago.
RIPE Atlas Probes