Agenda
Security Workshop
Time Schedule
Session 1 | 09:00 - 11:00 |
Break | 11:00 - 11:30 |
Session 2 | 11:30 - 13:00 |
Lunch | 13:00 - 14:00 |
Session 3 | 14:00 - 15:30 |
Break | 15:30 - 16:00 |
Session 4 | 16:00 - 18:00 |
Instructors
maz | Yoshinobu (Maz) Matzusaki | Internet Initiative Japan (Link) | Japan |
randy | Randy Bush | Internet Initiative Japan (Link) | Japan |
sheryl | Sheryl Hermoso | APNIC (Link) | Australia |
Available reference materials here?
Day 1 | Topic | Inst | Presentations |
---|---|---|---|
Session 0 | Intro | randy | 1-0-1 Intro |
- admin | |||
- agenda | |||
- materials and resources | |||
- facilities and wireless | |||
Session 1 | Assets & Threat Models | 1-1-1 Threats 1-1-2 Assets and Threats | |
- what assets are we protecting? | |||
- from what kinds of attackers? | |||
.. kiddies | |||
.. financial gain | |||
.. nation state (you're dead) | |||
Threat Pragmatics | 1-2 Pragmatics | ||
. to network infrastructure (routing, wiretap, ...) | |||
. to service infrastructure (dns, mail, ...) | |||
.to users | |||
Session 2 | Cryptography | sheryl | 1-3-1 Crypto Review |
- symmetric encryption | |||
- asymmetric encryption | |||
- digital signatures | |||
- hash functions | |||
- certificates & trust anchors | |||
Session 3-4 | Cryptography Applications / PGP | sheryl | |
- gpg | 2-1-1 PGP | ||
- PGP Lab | 2-1-1 PGP Lab | ||
Day 2 | |||
Session 1 | Cryptography Applications | ||
- ssh | randy | 2-2-1 SSH | |
- TLS | |||
Session 2 | Cryptography Applications | sheryl | |
- VPNs, IPsec | 2-2-2 VPN-IPsec | ||
- IPsec Lab | |||
Session 3 | Network Infrastructure | ||
- router and switch protection | randy | 2-3-1 Protecting Routers and Switches | |
- filtering at the border | sheryl | 2-1-2 Filtering at Border | |
- configuration & archiving | randy | 2-3-3 Archiving | |
Session 4 | Network Infrastructure contd. | ||
- Routing Protocol Protection | randy | 2-4-1 Routing Protocols 2-4-1 RPKI-Lab | |
Day 3 | |||
Session 1 | Topic description | ||
- Sick Host Detection | sheryl | 3-1-1 Sick Hosts | |
- Logging and Monitoring | maz | 3-1-2 Logging-monitoring | |
- IDS theory | maz | 3-1-3 IDS Theory | |
- IDS pragmatics - snort | 3-1-4 Snort Pragmatics | ||
- anomaly detection | maz | 3-1-5 Anomalies | |
- firewalls | maz | 3-1-6 Firewalls | |
Session 2 | DNS | ||
- DNS: auth, slave, cache | sheryl | 3-2-1 Securing DNS | |
- DNS Server Protection | sheryl | 3-2-2 DNSSEC | |
- Providing DNSsec / DNSsec Validation | 3-2-3 OpenDNSSEC | ||
- DNS Rate Limiting | randy | ||
Session 3 | Protecting Hosts from Net | 3-3-1 Hosts | |
- Host hardening | |||
- Default Services | |||
- Keeping up to date - patching | |||
- Get Patches from the Source | |||
- Mobile Hosts | 3-1-5 Mobile Node Security | ||
Session 4 | Protecting User Hosts | ||
- Backup! | |||
- Authentication Credentials | |||
- Authentication Services | |||
- Host-based Firewalls | |||
- Scanning for Diseases | |||
Day 4 | |||
Session 1 | Virus, Mail and Browsing | ||
- Anti-virus | maz & randy | 4-1-1 Anti-virus | |
- Safe Mail Practices | maz & randy | 4-1-2 Safer mail | |
- Safe Browsing Practices | maz & randy | 4-1-3 Safer browsing | |
Session 2 | Inter-Host Protocols | ||
- personal encryption of files | 3-4-1 File encryption | ||
- ssh, rsync, sftp, ... | randy | ||
- Covert Channels, VPNS, TOR, Steganography | sheryl | 4-2-3 Covert Channels | |
Session 3 | Plan in Advance | ||
- Host Forensics & Analysis | everyone | 4-1-1 FreeBSD hack | |
- Network Forensics & Analysis | maz | 4-1-2 Network Forensics | |
- Incident Reporting and Pre-approvals | sheryl | 4-3-3 Incident Reporting | |
- Post Mortem | maz | ||
- Wipe, Recover, Replace | maz | 4-1-5 Wipe-etc | |
- Archives and Remote Fallback | maz | 4-1-6 Archive Remote Fallback | |
Session 4 | Inter-Network Cooeperation | maz | |
- NOGs, CSIRT | 4-2 Inter-network Cooperation | ||
- Security Communities | 4-2-2 Inter-network Cooperation | ||
People | maz | ||
Dealing with LEO | 4-3-2 Leo | ||
Planning for the Future | |||
Misc | |||
Support docs | Editors, SSH, ... |
Last modified 4 years ago
Last modified on Nov 20, 2014, 7:13:41 PM
Attachments (36)
- 1-0-1.intro.pdf (109.5 KB) - added by trac 5 years ago.
- 1-1-1.Threats.pdf (2.1 MB) - added by trac 5 years ago.
- 1-2.Pragmatics.pdf (119.0 KB) - added by trac 5 years ago.
- 1-3.crypt.pdf (541.9 KB) - added by trac 5 years ago.
- 2-1-1.pgp-lab.html (40.5 KB) - added by trac 5 years ago.
- 2-1-1.pgp.pdf (228.2 KB) - added by trac 5 years ago.
- 2-2-1.ssh.pdf (1.1 MB) - added by trac 5 years ago.
- 2-2-2.VPN_IPsec_TLS.pdf (1.2 MB) - added by trac 5 years ago.
- 2-3-1.rtrs-switches.pdf (160.1 KB) - added by trac 5 years ago.
- 2-3-3.archiving.pdf (407.5 KB) - added by trac 5 years ago.
- 2-4-1.routing-protocols.pdf (3.0 MB) - added by trac 5 years ago.
- 2-4-1.RPKI-Lab.pdf (1.4 MB) - added by trac 5 years ago.
- 3-1-7.isp-ids.pdf (370.0 KB) - added by trac 5 years ago.
- 3-2-4.dns-rate-limit.pdf (131.9 KB) - added by trac 5 years ago.
- 3-4-2.rsync%2Bsftp.pdf (246.5 KB) - added by trac 5 years ago.
- 4-1-2.safer-mail.pdf (476.2 KB) - added by trac 5 years ago.
- 4-1-3.safer-browsing.pdf (2.2 MB) - added by trac 5 years ago.
- 5-3-1.AtlasProbes.pdf (2.0 MB) - added by trac 5 years ago.
- Crypto.Review.pdf (1.0 MB) - added by sheryl 5 years ago.
- 1-1-2.Assets-Threats.pdf (959.0 KB) - added by sheryl 4 years ago.
- 1-3-1.Crypto-Review.pdf (944.5 KB) - added by sheryl 4 years ago.
- 2-2-2.VPN-IPsec.pdf (875.0 KB) - added by sheryl 4 years ago.
- 3-1-1.sick-hosts.pdf (264.5 KB) - added by sheryl 4 years ago.
- 2-3-2.Filtering-at-border.pdf (1.1 MB) - added by sheryl 4 years ago.
- 3-1-3.hosts.pdf (2.3 MB) - added by sheryl 4 years ago.
- 3-2-1.Securing-DNS.pdf (781.4 KB) - added by sheryl 4 years ago.
- 4-2-3.Covert_Channels.pdf (1.7 MB) - added by sheryl 4 years ago.
- 4-3-3.IncidentReporting.pdf (111.7 KB) - added by sheryl 4 years ago.
- 3-1-2.logging-monitoring.pdf (349.6 KB) - added by sheryl 4 years ago.
- 3-1-4.snort-ids.pdf (1.2 MB) - added by sheryl 4 years ago.
- 3-1-5.anomaly.pdf (470.3 KB) - added by sheryl 4 years ago.
- 3-1-6.firewalls.pdf (451.9 KB) - added by sheryl 4 years ago.
- 3-2-3.opendnssec.pdf (683.5 KB) - added by sheryl 4 years ago.
- 3-3-1.hosts.pdf (2.3 MB) - added by sheryl 4 years ago.
- 4-1-1 anti-virus.pdf (597.0 KB) - added by sheryl 4 years ago.
- 4-3-4.wipe-etc.pdf (181.7 KB) - added by sheryl 4 years ago.