Agenda
Security Workshop
Time Schedule
| Session 1 | 09:00 - 11:00 |
| Break | 11:00 - 11:30 |
| Session 2 | 11:30 - 13:00 |
| Lunch | 13:00 - 14:00 |
| Session 3 | 14:00 - 15:30 |
| Break | 15:30 - 16:00 |
| Session 4 | 16:00 - 18:00 |
Instructors
| maz | Yoshinobu (Maz) Matzusaki | Internet Initiative Japan (Link) | Japan |
| randy | Randy Bush | Internet Initiative Japan (Link) | Japan |
| sheryl | Sheryl Hermoso | APNIC (Link) | Australia |
Available reference materials here?
| Day 1 | Topic | Inst | Presentations |
|---|---|---|---|
| Session 0 | Intro | randy | 1-0-1 Intro |
| - admin | |||
| - agenda | |||
| - materials and resources | |||
| - facilities and wireless | |||
| Session 1 | Assets & Threat Models | 1-1-1 Threats 1-1-2 Assets and Threats | |
| - what assets are we protecting? | |||
| - from what kinds of attackers? | |||
| .. kiddies | |||
| .. financial gain | |||
| .. nation state (you're dead) | |||
| Threat Pragmatics | 1-2 Pragmatics | ||
| . to network infrastructure (routing, wiretap, ...) | |||
| . to service infrastructure (dns, mail, ...) | |||
| .to users | |||
| Session 2 | Cryptography | sheryl | 1-3-1 Crypto Review |
| - symmetric encryption | |||
| - asymmetric encryption | |||
| - digital signatures | |||
| - hash functions | |||
| - certificates & trust anchors | |||
| Session 3-4 | Cryptography Applications / PGP | sheryl | |
| - gpg | 2-1-1 PGP | ||
| - PGP Lab | 2-1-1 PGP Lab | ||
| Day 2 | |||
| Session 1 | Cryptography Applications | ||
| - ssh | randy | 2-2-1 SSH | |
| - TLS | |||
| Session 2 | Cryptography Applications | sheryl | |
| - VPNs, IPsec | 2-2-2 VPN-IPsec | ||
| - IPsec Lab | |||
| Session 3 | Network Infrastructure | ||
| - router and switch protection | randy | 2-3-1 Protecting Routers and Switches | |
| - filtering at the border | sheryl | 2-1-2 Filtering at Border | |
| - configuration & archiving | randy | 2-3-3 Archiving | |
| Session 4 | Network Infrastructure contd. | ||
| - Routing Protocol Protection | randy | 2-4-1 Routing Protocols 2-4-1 RPKI-Lab | |
| Day 3 | |||
| Session 1 | Topic description | ||
| - Sick Host Detection | sheryl | 3-1-1 Sick Hosts | |
| - Logging and Monitoring | maz | 3-1-2 Logging-monitoring | |
| - IDS theory | maz | 3-1-3 IDS Theory | |
| - IDS pragmatics - snort | 3-1-4 Snort Pragmatics | ||
| - anomaly detection | maz | 3-1-5 Anomalies | |
| - firewalls | maz | 3-1-6 Firewalls | |
| Session 2 | DNS | ||
| - DNS: auth, slave, cache | sheryl | 3-2-1 Securing DNS | |
| - DNS Server Protection | sheryl | 3-2-2 DNSSEC | |
| - Providing DNSsec / DNSsec Validation | 3-2-3 OpenDNSSEC | ||
| - DNS Rate Limiting | randy | ||
| Session 3 | Protecting Hosts from Net | 3-3-1 Hosts | |
| - Host hardening | |||
| - Default Services | |||
| - Keeping up to date - patching | |||
| - Get Patches from the Source | |||
| - Mobile Hosts | 3-1-5 Mobile Node Security | ||
| Session 4 | Protecting User Hosts | ||
| - Backup! | |||
| - Authentication Credentials | |||
| - Authentication Services | |||
| - Host-based Firewalls | |||
| - Scanning for Diseases | |||
| Day 4 | |||
| Session 1 | Virus, Mail and Browsing | ||
| - Anti-virus | maz & randy | 4-1-1 Anti-virus | |
| - Safe Mail Practices | maz & randy | 4-1-2 Safer mail | |
| - Safe Browsing Practices | maz & randy | 4-1-3 Safer browsing | |
| Session 2 | Inter-Host Protocols | ||
| - personal encryption of files | 3-4-1 File encryption | ||
| - ssh, rsync, sftp, ... | randy | ||
| - Covert Channels, VPNS, TOR, Steganography | sheryl | 4-2-3 Covert Channels | |
| Session 3 | Plan in Advance | ||
| - Host Forensics & Analysis | everyone | 4-1-1 FreeBSD hack | |
| - Network Forensics & Analysis | maz | 4-1-2 Network Forensics | |
| - Incident Reporting and Pre-approvals | sheryl | 4-3-3 Incident Reporting | |
| - Post Mortem | maz | ||
| - Wipe, Recover, Replace | maz | 4-1-5 Wipe-etc | |
| - Archives and Remote Fallback | maz | 4-1-6 Archive Remote Fallback | |
| Session 4 | Inter-Network Cooeperation | maz | |
| - NOGs, CSIRT | 4-2 Inter-network Cooperation | ||
| - Security Communities | 4-2-2 Inter-network Cooperation | ||
| People | maz | ||
| Dealing with LEO | 4-3-2 Leo | ||
| Planning for the Future | |||
| Misc | |||
| Support docs | Editors, SSH, ... |
Last modified 4 years ago
Last modified on Nov 20, 2014, 7:13:41 PM
Attachments (36)
- 1-0-1.intro.pdf (109.5 KB) - added by trac 5 years ago.
- 1-1-1.Threats.pdf (2.1 MB) - added by trac 5 years ago.
- 1-2.Pragmatics.pdf (119.0 KB) - added by trac 5 years ago.
- 1-3.crypt.pdf (541.9 KB) - added by trac 5 years ago.
- 2-1-1.pgp-lab.html (40.5 KB) - added by trac 5 years ago.
- 2-1-1.pgp.pdf (228.2 KB) - added by trac 5 years ago.
- 2-2-1.ssh.pdf (1.1 MB) - added by trac 5 years ago.
- 2-2-2.VPN_IPsec_TLS.pdf (1.2 MB) - added by trac 5 years ago.
- 2-3-1.rtrs-switches.pdf (160.1 KB) - added by trac 5 years ago.
- 2-3-3.archiving.pdf (407.5 KB) - added by trac 5 years ago.
- 2-4-1.routing-protocols.pdf (3.0 MB) - added by trac 5 years ago.
- 2-4-1.RPKI-Lab.pdf (1.4 MB) - added by trac 5 years ago.
- 3-1-7.isp-ids.pdf (370.0 KB) - added by trac 5 years ago.
- 3-2-4.dns-rate-limit.pdf (131.9 KB) - added by trac 5 years ago.
- 3-4-2.rsync%2Bsftp.pdf (246.5 KB) - added by trac 5 years ago.
- 4-1-2.safer-mail.pdf (476.2 KB) - added by trac 5 years ago.
- 4-1-3.safer-browsing.pdf (2.2 MB) - added by trac 5 years ago.
- 5-3-1.AtlasProbes.pdf (2.0 MB) - added by trac 5 years ago.
- Crypto.Review.pdf (1.0 MB) - added by sheryl 5 years ago.
- 1-1-2.Assets-Threats.pdf (959.0 KB) - added by sheryl 4 years ago.
- 1-3-1.Crypto-Review.pdf (944.5 KB) - added by sheryl 4 years ago.
- 2-2-2.VPN-IPsec.pdf (875.0 KB) - added by sheryl 4 years ago.
- 3-1-1.sick-hosts.pdf (264.5 KB) - added by sheryl 4 years ago.
- 2-3-2.Filtering-at-border.pdf (1.1 MB) - added by sheryl 4 years ago.
- 3-1-3.hosts.pdf (2.3 MB) - added by sheryl 4 years ago.
- 3-2-1.Securing-DNS.pdf (781.4 KB) - added by sheryl 4 years ago.
- 4-2-3.Covert_Channels.pdf (1.7 MB) - added by sheryl 4 years ago.
- 4-3-3.IncidentReporting.pdf (111.7 KB) - added by sheryl 4 years ago.
- 3-1-2.logging-monitoring.pdf (349.6 KB) - added by sheryl 4 years ago.
- 3-1-4.snort-ids.pdf (1.2 MB) - added by sheryl 4 years ago.
- 3-1-5.anomaly.pdf (470.3 KB) - added by sheryl 4 years ago.
- 3-1-6.firewalls.pdf (451.9 KB) - added by sheryl 4 years ago.
- 3-2-3.opendnssec.pdf (683.5 KB) - added by sheryl 4 years ago.
- 3-3-1.hosts.pdf (2.3 MB) - added by sheryl 4 years ago.
- 4-1-1 anti-virus.pdf (597.0 KB) - added by sheryl 4 years ago.
- 4-3-4.wipe-etc.pdf (181.7 KB) - added by sheryl 4 years ago.
