wiki:Track3Agenda

Agenda

Security Workshop

Time Schedule

Session 1 09:00 - 11:00
Break 11:00 - 11:30
Session 2 11:30 - 13:00
Lunch 13:00 - 14:00
Session 3 14:00 - 15:30
Break 15:30 - 16:00
Session 4 16:00 - 18:00

Instructors

maz Yoshinobu (Maz) Matzusaki Internet Initiative Japan (Link) Japan
randy Randy Bush Internet Initiative Japan (Link) Japan
sheryl Sheryl Hermoso APNIC (Link) Australia

Available reference materials here?

Day 1 Topic Inst Presentations
Session 0 Intro randy 1-0-1 Intro
- admin
- agenda
- materials and resources
- facilities and wireless
Session 1 Assets & Threat Models 1-1-1 Threats 1-1-2 Assets and Threats
- what assets are we protecting?
- from what kinds of attackers?
.. kiddies
.. financial gain
.. nation state (you're dead)
Threat Pragmatics 1-2 Pragmatics
. to network infrastructure (routing, wiretap, ...)
. to service infrastructure (dns, mail, ...)
.to users
Session 2 Cryptography sheryl 1-3-1 Crypto Review
- symmetric encryption
- asymmetric encryption
- digital signatures
- hash functions
- certificates & trust anchors
Session 3-4 Cryptography Applications / PGP sheryl
- gpg 2-1-1 PGP
- PGP Lab 2-1-1 PGP Lab
Day 2
Session 1 Cryptography Applications
- ssh randy 2-2-1 SSH
- TLS
Session 2 Cryptography Applications sheryl
- VPNs, IPsec 2-2-2 VPN-IPsec
- IPsec Lab
Session 3 Network Infrastructure
- router and switch protection randy 2-3-1 Protecting Routers and Switches
- filtering at the border sheryl 2-1-2 Filtering at Border
- configuration & archiving randy 2-3-3 Archiving
Session 4 Network Infrastructure contd.
- Routing Protocol Protection randy 2-4-1 Routing Protocols 2-4-1 RPKI-Lab
Day 3
Session 1 Topic description
- Sick Host Detection sheryl 3-1-1 Sick Hosts
- Logging and Monitoring maz 3-1-2 Logging-monitoring
- IDS theory maz 3-1-3 IDS Theory
- IDS pragmatics - snort 3-1-4 Snort Pragmatics
- anomaly detection maz 3-1-5 Anomalies
- firewalls maz 3-1-6 Firewalls
Session 2 DNS
- DNS: auth, slave, cache sheryl 3-2-1 Securing DNS
- DNS Server Protection sheryl 3-2-2 DNSSEC
- Providing DNSsec / DNSsec Validation 3-2-3 OpenDNSSEC
- DNS Rate Limiting randy PDF
Session 3 Protecting Hosts from Net 3-3-1 Hosts
- Host hardening PDF
- Default Services PDF
- Keeping up to date - patching PDF
- Get Patches from the Source PDF
- Mobile Hosts 3-1-5 Mobile Node Security
Session 4 Protecting User Hosts
- Backup! PDF
- Authentication Credentials PDF
- Authentication Services PDF
- Host-based Firewalls PDF
- Scanning for Diseases PDF
Day 4
Session 1 Virus, Mail and Browsing
- Anti-virus maz & randy 4-1-1 Anti-virus
- Safe Mail Practices maz & randy 4-1-2 Safer mail
- Safe Browsing Practices maz & randy 4-1-3 Safer browsing
Session 2 Inter-Host Protocols
- personal encryption of files 3-4-1 File encryption
- ssh, rsync, sftp, ... randy PDF
- Covert Channels, VPNS, TOR, Steganography sheryl 4-2-3 Covert Channels
Session 3 Plan in Advance
- Host Forensics & Analysis everyone 4-1-1 FreeBSD hack
- Network Forensics & Analysis maz 4-1-2 Network Forensics
- Incident Reporting and Pre-approvals sheryl 4-3-3 Incident Reporting
- Post Mortem maz PDF
- Wipe, Recover, Replace maz 4-1-5 Wipe-etc
- Archives and Remote Fallback maz 4-1-6 Archive Remote Fallback
Session 4 Inter-Network Cooeperation maz
- NOGs, CSIRT 4-2 Inter-network Cooperation
- Security Communities 4-2-2 Inter-network Cooperation
People maz
Dealing with LEO 4-3-2 Leo
Planning for the Future PDF
Misc
Support docs Editors, SSH, ...
Last modified 4 years ago Last modified on Nov 20, 2014, 7:13:41 PM

Attachments (36)