Agenda

Security Workshop

Time Schedule

Session 1 09:00 - 11:00
Break 11:00 - 11:30
Session 2 11:30 - 13:00
Lunch 13:00 - 14:00
Session 3 14:00 - 15:30
Break 15:30 - 16:00
Session 4 16:00 - 18:00

Instructors

maz Yoshinobu (Maz) Matzusaki Internet Initiative Japan (Link) Japan
pappu Fakrul Alam Bangladesh Network Operators Group bdNOG (Link) Bangladesh
patrick Patrick Okui Network Startup Resource Center (Link) Uganda
randy Randy Bush Internet Initiative Japan (Link) Japan
sheryl Sheryl Hermoso APNIC (Link) Australia
steve Steven Bellovin Columbia University (Link) USA

Available reference materials here?

Day 1 Topic Inst Presentations
Session 0 Intro randy 1-0-1 Intro
- admin
- agenda
- materials and resources
- facilities and wireless
Session 1 Assets & Threat Models smb 1-1-1 Threats
- what assets are we protecting?
- from what kinds of attackers?
.. kiddies
.. financial gain
.. nation state (you're dead)
Session 2 Threat Pragmatics smb 1-2 Pragmatics
- to network infrastructure (routing, wiretap, ...)
- to service infrastructure (dns, mail, ...)
-to users
Session 3 Cryptography smb 1-3 Cryptography
- symmetric encryption
- asymmetric encryption
- digital signatures
- hash functions
- certificates & trust anchors
- random number generation
Day 2
Session 1 Cryptography Applications / PGP
- gpg patrick 2-1-1 PGP :: 2-1-1 PGP Lab
Session 2 Cryptography Applications
- ssh randy 2-2-1 SSH
- vpns, IPsec, TLS pappu & sheryl 2-2-2 VPN-IPsec-TLS
Session 3 Network Infrastructure
- router and switch protection randy 2-3-1 Protecting Routers and Switches
- filtering at the border pappu & sheryl 2-1-2 Netowrk Infrastructure
- configuration & archiving randy 2-3-3 Archiving
Session 4 Network Infrastructure contd.
- Routing Protocol Protection randy 2-4-1 Routing Protocols 2-4-1 RPKI-Lab
Day 3
Session 1 Topic description
- Sick Host Detection patrick 2-2-2 Sick Hosts
- Logging and Monitoring maz & pappu 2-3-1 Logging-monitoring
- IDS theory maz & pappu 2-3-2 IDS Theory
- IDS pragmatics - snort patrick 2-3-3 Snort Pragmatics
- anomaly detection maz & pappu 2-3-4 Anomalies
- firewalls maz & pappu 2-3-5 Firewalls
Session 2 DNS
- DNS: auth, slave, cache patrick & sheryl 2-4-1 Securing DNS
- DNS Server Protection patrick & sheryl 2-4-2 DNSSEC
- Providing DNSsec patrick & randy 2-4-3 OpenDNSSEC
- DNS Rate Limiting randy PDF
- Validating/Using DNSsec patrick & sheryl PDF
Session 3 Protecting Hosts from Net pappu, patrick, sheryl 3-1-1 Hosts
- Host hardening PDF
- Default Services PDF
- Keeping up to date - patching PDF
- Get Patches from the Source PDF
- Mobile Hosts 3-1-5 Mobile Node Security
Session 4 Protecting User Hosts pappu, patrick, sheryl
- Backup! PDF
- Authentication Credentials PDF
- Authentication Services PDF
- Host-based Firewalls PDF
- Scanning for Diseases PDF
Day 4
Session 1 Virus, Mail and Browsing
- Anti-virus maz & randy 3-3-2 Anti-virus
- Safe Mail Practices maz & randy 4-1-2 Safer mail
- Safe Browsing Practices maz & randy 4-1-3 Safer browsing
Session 2 Inter-Host Protocols
- personal encryption of files pappu 3-4-1 File encryption
- ssh, rsync, sftp, ... randy & sheryl PDF
- Covert Channels, VPNS, TOR, Steganography pappu & sheryl 3-4-3 Covert Channels
Session 3 Plan in Advance
- Host Forensics & Analysis everyone 4-1-1 FreeBSD hack
- Network Forensics & Analysis maz & sheryl 4-1-2 Network Forensics
- Incident Reporting and Pre-approvals sheryl 4-1-3 Incident Reporting
- Post Mortem pappu, maz & sheryl PDF
- Wipe, Recover, Replace maz & sheryl 4-1-5 Wipe-etc
- Archives and Remote Fallback maz & sheryl 4-1-6 Archive Remote Fallback
Session 4 Inter-Network Cooeperation maz & sheryl
- NOGs, CSIRT 4-2 Inter-network Cooperation
- Security Communities 4-2-2 Inter-network Cooperation
Day 5
Session 1 People maz & sheryl
Dealing with LEO pappu 4-3-2 Leo
Session 2 Planning for the Future pappu PDF
Session 3 Atlas Probes randy 5-3-1.AtlasProbes.pdf Atlas Probes
Misc
Support docs Editors, SSH, ...
Last modified 5 years ago Last modified on Jan 19, 2014, 5:25:37 AM

Attachments (18)