wiki:Track5Agenda

Agenda

Security Workshop

Time Schedule

Session 1 09:00 - 11:00
Break 11:00 - 11:30
Session 2 11:30 - 13:00
Lunch 13:00 - 14:00
Session 3 14:00 - 15:30
Break 15:30 - 16:00
Session 4 16:00 - 18:00

Instructors

maz Yoshinobu (Maz) Matzusaki Internet Initiative Japan (Link) Japan
randy Randy Bush Internet Initiative Japan (Link) Japan
sheryl Sheryl Hermoso APNIC (Link) Australia
pappu Fakrul Alam bdHUB (Link) Bangladesh

Available reference materials here

Day 1 Topic Inst Presentations
Session 0 Intro randy 1-0-1 Intro
- admin
- agenda
- materials and resources
- facilities and wireless
Session 1 Assets & Threat Models 1-1-1 Threats 1-1-2 Assets and Threats
- what assets are we protecting?
- from what kinds of attackers?
.. kiddies
.. financial gain
.. nation state (you're dead)
Threat Pragmatics 1-2 Pragmatics
. to network infrastructure (routing, wiretap, ...)
. to service infrastructure (dns, mail, ...)
.to users
Session 2 Cryptography sheryl 1-3-1 Crypto Review
- symmetric encryption
- asymmetric encryption
- digital signatures
- hash functions
- certificates & trust anchors
Session 3-4 Cryptography Applications / PGP sheryl
- gpg 2-1-1 PGP
- PGP Lab 2-1-1 PGP Lab
Day 2
Session 1 Cryptography Applications
- ssh randy 2-2-1 SSH
Session 2 Cryptography Applications sheryl
- VPNs, IPsec 2-2-1.VPN-IPsec.pdf
- TLS/SSL 2-2-2.ssl.pdf
- IPsec Lab 2-2-3.SSL-Lab.pdf
Session 3 Network Infrastructure
- router and switch protection randy 2-3-1 Protecting Routers and Switches
- filtering at the border sheryl 2-1-2 Filtering at Border
- configuration & archiving randy 2-3-3 Archiving
Session 4 Network Infrastructure contd.
- Routing Protocol Protection randy 2-4-1 Routing Protocols 2-4-1 RPKI-Lab
Day 3
Session 1 Topic description
- Sick Host Detection sheryl 3-1-1 Sick Hosts
- Logging and Monitoring maz 3-1-2 Logging-monitoring
- IDS pragmatics - snort 2-3-4.snort
- IDS pragmatics - snort-lab 2-3-4.snort-lab
- anomaly detection maz 3-1-5 Anomalies
- firewalls maz 3-1-6 Firewalls
Session 2 DNS
- DNS: auth, slave, cache sheryl 3-2-1 Securing DNS
- DNS Server Protection sheryl 3-2-2 DNSSEC
- Providing DNSsec / DNSsec Validation 3-2-3 OpenDNSSEC
- DNS Rate Limiting randy PDF
Session 3 Protecting Hosts from Net 3-3-1 Hosts
- Host hardening PDF
- Default Services PDF
- Keeping up to date - patching PDF
- Get Patches from the Source PDF
- Mobile Hosts 3-1-5 Mobile Node Security
Session 4 Protecting User Hosts
- Backup! PDF
- Authentication Credentials PDF
- Authentication Services PDF
- Host-based Firewalls PDF
- Scanning for Diseases PDF
Day 4
Session 1 Virus, Mail and Browsing
- Anti-virus maz & randy 4-1-1 Anti-virus
- Safe Mail Practices maz & randy 4-1-2 Safer mail
- Safe Browsing Practices maz & randy 4-1-3 Safer browsing
Session 2 Inter-Host Protocols
- personal encryption of files 3-4-1 File encryption
- ssh, rsync, sftp, ... randy PDF
- Covert Channels, VPNS, TOR, Steganography sheryl 4-2-3 Covert Channels
Session 3 Plan in Advance
- Host Forensics & Analysis everyone 4-1-1 FreeBSD hack
- Network Forensics & Analysis maz 4-1-2 Network Forensics
- Incident Reporting and Pre-approvals sheryl 4-3-3 Incident Reporting
- Post Mortem maz PDF
- Wipe, Recover, Replace maz 4-1-5 Wipe-etc
... Archives and Remote Fallback
Session 4 Inter-Network Cooeperation maz
- NOGs, CSIRT 4-2 Inter-network Cooperation
- Security Communities 4-2-2 Inter-network Cooperation
People
Dealing with LEO maz 4-3-2 Leo
Planning for the Future PDF
Misc Wireshark Wireshark
Support docs Editors, SSH, ...
Last modified 5 years ago Last modified on Jan 10, 2015, 4:20:27 PM

Attachments (20)