NSRC / EVENT SPONSOR
[Main Page](index.html "Main Page")
# Practical Cybersecurity for Internet Operators - 4 day: Agenda # ## Time Schedule ## |Schedule |Time | |------------------|----------------| |Session 1 |09:00 - 10:30 | |Break |10:30 - 11:00 | |Session 2 |11:00 - 12:30 | |Lunch |12:30 - 14:00 | |Session 3 |14:00 - 15:30 | |Break |15:30 - 16:00 | |Session 4 |16:00 - 17:30 | ## Instructors ## | FL | Name | Email | Organization | Country | |----|-----------------------|----------------------------|--------------|---------------| | XY | Named, Appropriately | instructor(at)uoregon(dot)edu | [University of Oregon](http://uoregon.edu)| USA | ## Sessions ## | DAY 1 | Topic | Inst | Presentations | Exercises | |------------------------|---------------------------|---------|---------------------------------------------------|----------------------------------------| | Session 1.1 | Introduction to the PCIO Workshop | TBD | [PDF](networking/pcio/en/presentations/Introduction.pdf) | | | Session 1.2 | Thinking about Security | TBD | [PDF](networking/pcio/en/presentations/Thinking-about-security.pdf) | | | Session 1.3 | Start using a Password Manager | TBD | | [Password Manager Lab](networking/pcio/en/labs/Start-using-a-password-manager.html) | | Session 1.4 | Layer 1, 2 and 3 Best Practices | TBD | [PDF](networking/pcio/en/presentations/Layer-123-best-practices.pdf) | | | Session 1.5 | Management Networks and OOB | TBD | [PDF](networking/pcio/en/presentations/Management-Networks-and-OOB.pdf) | | | Session 1.6 | Cisco Configuration Essentials | TBD | [PDF](networking/cndo/en/presentations/Cisco-Configuration-Essentials.pdf) | | | Session 1.7 | Layer 2 Lab Setup | TBD | | [Switch Setup Lab](networking/cndo/en/labs/l2_setup.html) | | | | | | [IP Address Plan](networking/cndo/en/labs/ip_address_plan.html) | | | | | | [Diagram - flat](networking/cndo/diagrams/cnd-campus-handout-flat.pdf) | | Session 1.8 | Router and Host Security Configuration | TBD | [PDF](networking/pcio/en/presentations/Router-Host-Security-Configuration.pdf) | [Router and Host Security Lab](networking/pcio/en/labs/router-host-security-lab.html) | | **DAY 2** | | | | | | Session 2.1 | Switching Architectures: VLANs | TBD | [PDF](networking/cndo/en/presentations/Layer2-VLANs.pdf) | [VLAN Lab](networking/cndo/en/labs/l2_vlan_lab.html) | | | | | | [Diagram - VLANs](networking/cndo/diagrams/cnd-campus-handout-vlans.pdf) | | Session 2.2 | Switching Architectures: L2 Protection Features | TBD | [PDF](networking/cndo/en/presentations/Layer2-Protection.pdf) | [L2 Protection Features Lab](networking/cndo/en/labs/l2_protection.html) | | Session 2.3 | Wireless Security | TBD | [PDF](networking/pcio/en/presentations/Wireless-Security.pdf) | | | Session 2.4 | Layer 3 Device Security on L2 | TBD | [PDF](networking/pcio/en/presentations/Layer3-Device-Security-on-L2.pdf) | | | Session 2.5 | Host AutoConfiguration Best Practices | TBD | [PDF](networking/pcio/en/presentations/Host-AutoConfig-BCP.pdf) | | | Session 2.6 | Introduction to Routing Security | TBD | [PDF](networking/pcio/en/presentations/Intro-to-routing-security.pdf) | | | **DAY 3** | | | | | | Session 3.1 | Securing the Router | TBD | | [Securing Router Lab](networking/routing-security/en/labs/securing-router.html) | | Session 3.2 | Lab Access | TBD | | [Lab Access](networking/routing-security/en/labs/lab-access.html) | | | | | | [Address Plan](networking/routing-security/en/labs/address-plan.html) | | Session 3.3 | eBGP with Transit | TBD | | [eBGP Lab](networking/routing-security/en/labs/ebgp.html) | | Session 3.4 | BGP Best Practices | TBD | [PDF](networking/bgp-deploy/en/presentations/BGP-BCP.pdf) | | | Session 3.5 | Unicast Reverse Path Forwarding | TBD | [PDF](networking/routing-security/en/presentations/uRPF.pdf) | | | Session 3.6 | Unicast Reverse Path Forwarding Lab | TBD | | [uRPF Lab](networking/routing-security/en/labs/uRPF.html) | | Session 3.7 | Remote Trigger Blackhole Filtering | TBD | [PDF](networking/routing-security/en/presentations/RTBH.pdf) | | | Session 3.8 | RTBH within an AS | TBD | | [RTBH within an AS Lab](networking/routing-security/en/labs/RTBH-local.html) | | Session 3.9 | RPKI Operations | TBD | [PDF](networking/routing-security/en/presentations/RPKI-Operations.pdf) | | | Session 3.10 | Configuring RPKI on routers | TBD | | [RPKI Lab](networking/routing-security/en/labs/rpki.html) | | Session 3.11 | Configuring Route Origin Validation on routers | TBD | | [ROV Lab](networking/routing-security/en/labs/rov.html) | | **DAY 4** | | | | | | Session 4.1 | Seven Layers of Basic Cybersecurity | TBD | [PDF](networking/cndo/en/presentations/Seven-Layer-Cybersecurity-Strategy.pdf) | | | Session 4.2 | Firewalls, Packet Filters & Proxies | TBD | [PDF](networking/pcio/en/presentations/Firewalls-Packet-Filters-Proxies.pdf) | | | Session 4.3 | DNSSEC Refresher | TBD | [PDF](dns/materials/presos/en/kindns-dnssec-refresher.pdf) | | | Session 4.4 | KINDNS for ISPs | TBD | [PDF](dns/materials/presos/en/dns-kindns-for-isps.pdf) | | | Session 4.5 | Vulnerability Management | TBD | [PDF](networking/pcio/en/presentations/Vulnerability-management.pdf) | | | Session 4.6 | Tabletop Exercises | TBD | [PDF](networking/pcio/en/presentations/Tabletop-exercises.pdf) | | ## Additional Information ## - A ZIP archive of these materials - [RFC8212 - Default External BGP (EBGP) Route Propagation Behavior without Policies](https://tools.ietf.org/html/rfc8212) - [Internet Routing Security Best Practices for Network Operators (MANRS)](https://www.manrs.org/manrs/) - [RIPE 706 MANRS Implementation Guide](https://www.ripe.net/publications/docs/ripe-706) - [BCP 38 - Network Ingress Filtering to Defeat Denial of Service Attacks which employ IP Source Address Spoofing](https://tools.ietf.org/html/bcp38) - [RFC7454 - BGP Operations Security](https://tools.ietf.org/html/rfc7454) - [Internet Routing Security Best Practices for Network Operators (MANRS)](https://www.manrs.org/manrs/) - [BCP 38 - Network Ingress Filtering to Defeat Denial of Service Attacks which employ IP Source Address Spoofing](https://tools.ietf.org/html/bcp38) - [RFC7115 - Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI)](https://tools.ietf.org/html/rfc7115)