wiki:Track3Security

Agenda

Security Workshop

Time Schedule

Session 1 09:00 - 10:30
Break 10:30 - 11:00
Session 2 11:00 - 12:30
Lunch 12:30 - 14:00
Session 3 14:00 - 15:30
Break 15:30 - 16:00
Session 4 16:00 - 18:00

Instructors

maz Yoshinobu (Maz) Matzusaki Internet Initiative Japan Japan
daniel Daniel Griggs NZRS New Zealand
randy Randy Bush Internet Initiative Japan Japan
alisha Alisha Gurung TashiCell Bhutan

Available reference materials here

Day 1 Topic Inst Presentations
Session 0 Intro randy 1-0-1 Intro
- admin
- agenda
- materials and resources
- facilities and wireless
Session 1 Assets & Threat Models 1-1-1 Assets and Threats
- what assets are we protecting? 1-1-2 Threat Models
- from what kinds of attackers?
.. kiddies
.. financial gain
.. nation state (you're dead)
Threat Pragmatics 1-1-3 Pragmatics
. to network infrastructure (routing, wiretap, ...)
. to service infrastructure (dns, mail, ...)
.to users
Social Engineering
Session 2 Cryptography 1-2-1 Crypto Review
- symmetric encryption
- asymmetric encryption
- digital signatures
- hash functions
- certificates & trust anchors
Session 3-4 Cryptography Applications / PGP
- gpg 1-3-1 PGP
- PGP Lab 1-3-2 PGP Lab
Day 2
Session 1 Cryptography Applications
- ssh randy 2-1-1 SSH
Session 2 Cryptography Applications
- VPNs, IPsec 2-2-1 VPN IPsec
- TLS/SSL 2-2-2.ssl.pdf
Session 3 OpenVPN & pfSense randy 2-3-1 OpenVPN
Wireshark Wireshark
Session 4 Network Infrastructure
- router and switch protection randy 2-4-2 Routers & Switchs
- filtering at the border 2-1-2 Filtering at Border
- configuration & archiving randy 2-4-4 Archiving
Day 3
Session 1 Network Infrastructure 3-1-1 Routing Protocols
- Routing Protocol Protection randy 3-1-2 RPKI-Lab
Session 2 Topic description
- Sick Host Detection 3-2-1 Sick Hosts
- Logging and Monitoring maz 3-1-2 Logging-monitoring
- anomaly detection maz 3-1-5 Anomalies
- firewalls maz 3-1-6 Firewalls
Session 3 IDS
- IDS pragmatics - snort 2-3-4.snort
- IDS pragmatics - snort-lab 2-3-4.snort-lab
Session 4 DNS
- DNS: auth, slave, cache 3-4-1 Securing DNS
- DNS Server Protection 3-4-2 DNSSEC
- Providing DNSsec / DNSsec Validation 3-4-3 OpenDNSSEC
- DNS Rate Limiting maz 3.4.2 DNS Rate Limiting
Day 4
Session 1 Protecting Hosts from Net 3-3-1 Hosts
- Host hardening PDF
- Default Services PDF
- Keeping up to date - patching PDF
- Get Patches from the Source PDF
- Mobile Hosts 4-1-5 Mobile Node Security
- Backup! PDF
- Authentication Credentials PDF
- Authentication Services PDF
- Host-based Firewalls PDF
- Scanning for Diseases PDF
Session 2 Virus, Mail and Browsing
- Anti-virus maz 4-1-1 Anti-virus
- Safe Mail Practices maz 4-2-3 Safer Mail
- Safe Browsing Practices maz 4-2-3 Safer browsing
Session 3 Inter-Host Protocols
- personal encryption of files 4-3-1 File encryption
- sftp, ... 4-3-2 sftp & scp
- Covert Channels, VPNS, TOR, Steganography 4-3-3 Covert Channels
Day 5
Session 1 Plan in Advance
- Host Forensics & Analysis everyone 5-1-1 FreeBSD hack
- Network Forensics & Analysis maz 5-1-2 Network Forensics
- Incident Reporting and Pre-approvals 5-1-3 Incident Reporting
- Post Mortem maz
- Wipe, Recover, Replace maz 5-1-4 Wipe-etc
... Archives and Remote Fallback
Session 2 Inter-Network Cooeperation maz
- NOGs, CSIRT 5-2-1
- Security Communities 5-2-2 Security Communities
People
Session 3 Dealing with LEO maz 5-3-2 Leo
Planning for the Future PDF
Session 4 Open
Support docs Editors, SSH, ...
Last modified 2 years ago Last modified on Oct 18, 2015, 10:14:18 PM

Attachments (42)