Agenda
Network Security
Time Schedule
Session 1 | 09:00 - 10:30 |
Break | 10:30 - 11:00 |
Session 2 | 11:00 - 13:00 |
Lunch | 13:00 - 14:00 |
Session 3 | 14:00 - 15:30 |
Break | 15:30 - 16:00 |
Session 4 | 16:00 - 18:00 |
Instructors
DP | Dean Pemberton | NSRC | NZ |
JB | John Brewer | NSRC | NZ |
Available reference materials here
Day 2 | Topic | Inst | Presentations |
---|---|---|---|
Session 1 | Intro, Welcome, Workshop details, accessing the virtual environment | DP | 0-2-0-welcome.pdf |
Systems & Network Security Intro | JB | 0-2-1-intro-security.pdf | |
Session 2 | Threat Models | JB | 0-2-2-threats.pdf |
Threat Pragmatics | JB | 0-2-3-pragmatics.pdf | |
Session 3 | Port mirroring, TCPDump, Wireshark - all LAB | DP & JB | 0-2-9-Wireshark_Lab.pdf exercise-data.zip |
Session 4 | SSH Lecture | JB | 0-3-3-sec-ssh-short.pdf |
SSH Lab | DP & JB | ||
Day 3 | |||
Session 1 | SSH Lab | DP | |
Cryptography Overview Shorter | JB | 0-3-1-cryptography-overview-shorter.pdf | |
Session 2 | PGP Lecture | DP | 0-3-2-pgp.pdf |
PGP Lab | DP & JB | ||
Session 3 | VPNs IPSEC TLS Lecture | DP | 0-3-4.VPN_IPsec_TLS.pdf |
Session 4 | Host Security | DP | 0-4-1-host-security.pdf |
Day 4 | |||
Session 1 | Router and Switch protection | DP | 13-IPv6-Hardening.pdf |
Session 2 | - Logging and Monitoring | DP | 15-IPv6-SecurityMonitoring.pdf |
- IDS theory | DP | ||
- IDS pragmatics - snort | DP | ||
Session 3 | - anomaly detection | DP | 2-3-5-anomaly.pdf |
- firewalls | DP | 2-3-4-firewalls.pdf | |
Session 4 | DP | ||
Day 5 | |||
Session 1 | Other Security Topics | DP | 3-4-3.Covert_Channels.pdf 4-1-3.IncidentReporting.pdf 4-1-3.safer-browsing.pdf |
Session 2 | Exam and Certificate Presentation | DP |
Resources
Last modified 5 years ago
Last modified on Jul 17, 2014, 4:43:26 PM
Attachments (46)
- 1.Introduction.pdf (209.6 KB) - added by fakrul 5 years ago.
- 1.1.2 Asset & Threats Models.pdf (1.8 MB) - added by fakrul 5 years ago.
- 1.1.3 Threat Pragmatics.pdf (273.4 KB) - added by fakrul 5 years ago.
- 2.Asset_Threats_Models.pdf (1.8 MB) - added by fakrul 5 years ago.
- 3.Threat_Pragmatics.pdf (273.4 KB) - added by fakrul 5 years ago.
- 4.CSIRT-Module.pdf (2.4 MB) - added by fakrul 5 years ago.
- 5.CryptographyApplications_PGP.pdf (636.8 KB) - added by fakrul 5 years ago.
- 6.CryptographyApplications_SSH.pdf (2.5 MB) - added by fakrul 5 years ago.
- PGP_Lab.pdf (845.5 KB) - added by fakrul 5 years ago.
- pgp-lab.html (25.5 KB) - added by fakrul 5 years ago.
- 7.bdnog1-securing-networkinfra.pdf (1.2 MB) - added by fakrul 5 years ago.
- Route-Filtering-v1.pdf (1.2 MB) - added by fakrul 5 years ago.
- SecModuleRoute Map.pdf (266.6 KB) - added by fakrul 5 years ago.
- SecModuleRouteMap.pdf (266.6 KB) - added by fakrul 5 years ago.
- 8.DNSSEC-v1.pdf (604.8 KB) - added by fakrul 5 years ago.
- 9.ids_snort.pdf (961.5 KB) - added by fakrul 5 years ago.
- 10.Wireshark.pdf (1.1 MB) - added by fakrul 5 years ago.
- Exercise_Data.zip (453.5 KB) - added by fakrul 5 years ago.
-
bdNOG_Participants.jpg
(381.3 KB) -
added by fakrul 5 years ago.
bdNOG1 Workshop Participants
- bind-9.9.5.tar.gz (7.4 MB) - added by fakrul 5 years ago.
- openssl-1.0.1g.tar.gz (4.3 MB) - added by fakrul 5 years ago.
- Honeypot-Overview-BDNOG1-201405.pdf (198.9 KB) - added by fakrul 5 years ago.
- 0-2-0-welcome.pdf (2.7 MB) - added by dean 5 years ago.
- 0-2-1-intro-security.pdf (906.8 KB) - added by dean 5 years ago.
- 0-2-2-threats.pdf (357.4 KB) - added by dean 5 years ago.
- 0-2-3-pragmatics.pdf (703.9 KB) - added by dean 5 years ago.
- 0-2-9-Wireshark_Lab.pdf (1.9 MB) - added by dean 5 years ago.
- 0-2-9-Wireshark_Lab.2.pdf (1.9 MB) - added by dean 5 years ago.
- exercise-data.zip (454.3 KB) - added by dean 5 years ago.
- 0-3-1-cryptography-overview-shorter.pdf (6.3 MB) - added by dean 5 years ago.
- 0-3-2-pgp.pdf (519.4 KB) - added by dean 5 years ago.
- 0-3-3-sec-ssh-short.pdf (5.6 MB) - added by dean 5 years ago.
- 0-3-4.VPN_IPsec_TLS.pdf (1.8 MB) - added by dean 5 years ago.
- 0-4-1-host-security.pdf (1.8 MB) - added by dean 5 years ago.
- 2-3-1.rtrs-switches.pdf (201.8 KB) - added by dean 5 years ago.
- S09-IPv6-Hardening.pdf (1.3 MB) - added by dean 5 years ago.
- S15-IPv6-SecurityMonitoring.pdf (1.3 MB) - added by dean 5 years ago.
- 2-3-5 anomaly.pdf (485.8 KB) - added by dean 5 years ago.
- 2-3-5-anomaly.pdf (485.8 KB) - added by dean 5 years ago.
- 13-IPv6-Hardening.pdf (1.3 MB) - added by dean 5 years ago.
- 2-3-4 firewalls.pdf (467.7 KB) - added by dean 5 years ago.
- 2-3-4-firewalls.pdf (467.7 KB) - added by dean 5 years ago.
- 15-IPv6-SecurityMonitoring.pdf (1.3 MB) - added by dean 5 years ago.
- 3-4-3.Covert_Channels.pdf (1.6 MB) - added by dean 5 years ago.
- 4-1-3.IncidentReporting.pdf (111.7 KB) - added by dean 5 years ago.
- 4-1-3.safer-browsing.pdf (2.3 MB) - added by dean 5 years ago.