NSRC / BTNOG
[Main Page](index.html "Main Page") | [Agenda](agenda.html "Agenda")
# Practical Cybersecurity for Internet Operators Workshop # ## Time Schedule ## |Schedule |Time | |------------------|----------------| |Session 1 |09:00 - 10:30 | |Break |10:30 - 11:00 | |Session 2 |11:00 - 12:30 | |Lunch |12:30 - **13:30** | |Session 3 |**13:30** - 15:30 | |Break |15:30 - 16:00 | |Session 4 |16:00 - 17:30 | ## Instructors ## | FL | Name | Email | Organization | Country | |----|----------------|---------------------------------------|--------------|----------------| | CW | Champika Wijayatunga | champika(dot)wijayatunga(at)icann(dot)org | [ICANN](https://www.icann.org/) | AU | | ES | Edwin Sandys | edwin(dot)sandys(at)usp(dot)ac(dot)fj | University of South Pacific ([USP](https://www.usp.ac.fj/)) | FJ | | MQ | Melvin Quemado | mquemado(at)hawaii(dot)edu | [University of Hawaiʻi](https://www.hawaii.edu/) | US | | PP | Philip Paeps | ppaeps(dot)nsrc(dot)org | [Network Startup Resource Center](https://nsrc.org/bios/PhilipPaeps.html)| HK | | PS | Philip Smith | philip(dot)nsrc(dot)org | [Network Startup Resource Center](https://nsrc.org/bios/PhilipSmith.html)| AU | ## Sessions ## **NOTE: THIS IS A DRAFT!** The precise agenda will evolve in function of the group we get and the participants' interests / experiences. Remember: this is *your* workshop. | DAY | Topic | Inst | Presentations | Exercises | |----------------------|---------------------------|---------|---------------------------------------------------|----------------------------------------| | **TUESDAY** | | | | | | Session 1.1 | Introduction & logistics | PP | [PDF](practical-security/presentations/0-workshop-introduction.pdf) | | | Session 1.2 | Thinking about security | PP | [PDF](practical-security/presentations/1-thinking-about-security.pdf) | | | Session 2.1 | Lab: start using a password manager | All | | [Start using a password manager](practical-security/labs/1-start-using-a-password-manager.html) | | Session 2.2 | Incident response at UH (1) | MQ | | | | Session 3.1 | Incident response at UH (2) | MQ | | | | Session 3.2 | Introduction to tabletop exercices | PP | [PDF](practical-security/presentations/2-tabletop-exercises.pdf) | | | Session 4.1 | Lab: tabletop exercise | All | | [Backdoors & Breaches](practical-security/labs/2-backdoors-and-breaches.html) | | **WEDNESDAY** | | | | | | Session 1.1 | Tuesday recap | PP | | | | Session 1.2 | Vulnerability management | PP | [PDF](practical-security/presentations/3-vulnerability-management.pdf) | | | Session 2.1 | Demo: Wazuh at USP | ES | | | | Session 3.1 | Switching Architectures: L2 Protection Features | PS | [PDF](networking/cndo/en/presentations/Layer2-Protection.pdf) | [L2 Protection Features Lab](networking/cndo/en/labs/l2_protection.html) | | Session 4.1 | Layer 1-2-3 best practices | PP | [PDF](practical-security/presentations/4-layer-1-2-3-best-practices.pdf) | | | Session 4.2 | Campus security configuration | PP | [PDF](practical-security/presentations/5-campus-security-configuration.pdf) | | | Session 4.3 | Group discussion | All | | | | **THURSDAY** | | | | | | Session 1.1 | Wednesday recap | PP | | | | Session 1.1 | DNS security: introduction | PP| [PDF](kindns/presentations/1-kindns-intro.pdf) | | | Session 1.2 | DNS refresher: basics | CW | [PDF](kindns/presentations/2-DNS-refresher.pdf) | | | Session 1.3 | DNS refresher: components | CW | [PDF](kindns/presentations/3-DNS-components.pdf) | | | Session 2.1 | Demo: DNS queries and responses | PP | | [DNS queries & responses](kindns/labs/0-dns-queries-and-responses.html)| | Session 2.2 | Best practices: revision control | PP | [PDF](kindns/presentations/4-revision-control.pdf) | [First steps with Git](kindns/labs/1-git-first-steps.html)| | Session 3.1 | DNSSEC introduction | PP | [PDF](kindns/presentations/4-dnssec-introduction.pdf)| | | Session 3.2 | Lab: DNS refresher: zone files & authoritative servers | All | | [Configuring DNS servers](kindns/labs/3-configuring-dns-servers.html)| | Session 4.1 | Lab: DNSSEC signing | All | | [Sign your zones](kindns/labs/2-dnssec-sign-zone.html) | | **FRIDAY** | | | | | | Session 1.1 | Introduction to Routing Security | | | | | Session 1.2 | BGP Introduction | PS | [PDF](networking/bgp-deploy/en/presentations/BGP-introduction.pdf) | | | Session 2.1 | Securing the Router | All | | [Securing Router Lab](networking/routing-security/en/labs/securing-router.html) | | | | | | [Lab Diagram](networking/routing-security/diagrams/riso-0.png) | | | | | | [Lab Access](networking/routing-security/en/labs/lab-access.html) | | | | | | [Address Plan](networking/routing-security/en/labs/address-plan.html) | | Session 2.2 | BGP Best Practices | PS | [PDF](networking/bgp-deploy/en/presentations/BGP-BCP.pdf) | | | Session 3.1 | Unicast Reverse Path Forwarding | PS | [PDF](networking/routing-security/en/presentations/uRPF.pdf) | | | Session 3.2 | Unicast Reverse Path Forwarding Demo | All | | [uRPF Lab](networking/routing-security/en/labs/uRPF.html) | | Session 3.3 | Remotely Triggered Blackhole Filtering | PS | [PDF](networking/routing-security/en/presentations/RTBH.pdf) | | | Session 3.4 | RTBH within an AS Demo | All | | [RTBH within an AS Lab](networking/routing-security/en/labs/RTBH-local.html) | | Session 4.1 | BGP Origin Validation | PS | [PDF](networking/routing-security/en/presentations/BGP-Origin-Validation.pdf) | | | Session 4.2 | Configuring RPKI on routers | TBD | | [RPKI Lab](networking/routing-security/en/labs/rpki.html) | | Session 4.3 | Configuring Route Origin Validation on routers | TBD | | [ROV Lab](networking/routing-security/en/labs/rov.html) | ## Additional Materials ## | DAY | Topic | Inst | Presentations | Exercises | |----------------------|---------------------------|---------|---------------------------------------------------|----------------------------------------| | | Securing BGP: MaxAS | All | | [Securing BGP Lab: MaxAS](networking/routing-security/en/labs/securing-bgp-maxas.html) | | | Securing BGP: MaxPrefix | All | | [Securing BGP Lab: MaxPrefix](networking/routing-security/en/labs/securing-bgp-maxprefix.html) | | | Securing BGP: GTSM | All | | [Securing BGP Lab: GTSM](networking/routing-security/en/labs/securing-bgp-GTSM.html) | | | Securing BGP: PrivateAS | All | | [Securing BGP Lab: Private AS](networking/routing-security/en/labs/securing-bgp-privateAS.html) | ## Additional Information ## - [RFC8212 - Default External BGP (EBGP) Route Propagation Behavior without Policies](https://tools.ietf.org/html/rfc8212) - [Internet Routing Security Best Practices for Network Operators (MANRS)](https://www.manrs.org/manrs/) - [RIPE 706 MANRS Implementation Guide](https://www.ripe.net/publications/docs/ripe-706) - [RFC7454 - BGP Operations Security](https://tools.ietf.org/html/rfc7454) - [Internet Routing Security Best Practices for Network Operators (MANRS)](https://www.manrs.org/manrs/) - [BCP 38 - Network Ingress Filtering to Defeat Denial of Service Attacks which employ IP Source Address Spoofing](https://tools.ietf.org/html/bcp38)