Agenda
Security Workshop
Time Schedule
| Session 1 | 09:00 - 11:00 |
| Break | 11:00 - 11:30 |
| Session 2 | 11:30 - 13:00 |
| Lunch | 13:00 - 14:00 |
| Session 3 | 14:00 - 15:30 |
| Break | 15:30 - 16:00 |
| Session 4 | 16:00 - 18:00 |
Instructors
| maz | Yoshinobu (Maz) Matzusaki | Internet Initiative Japan (Link) | Japan |
| pappu | Fakrul Alam | Bangladesh Network Operators Group bdNOG (Link) | Bangladesh |
| patrick | Patrick Okui | Network Startup Resource Center (Link) | Uganda |
| randy | Randy Bush | Internet Initiative Japan (Link) | Japan |
| sheryl | Sheryl Hermoso | APNIC (Link) | Australia |
| steve | Steven Bellovin | Columbia University (Link) | USA |
Available reference materials here?
| Day 1 | Topic | Inst | Presentations |
|---|---|---|---|
| Session 0 | Intro | randy | 1-0-1 Intro |
| - admin | |||
| - agenda | |||
| - materials and resources | |||
| - facilities and wireless | |||
| Session 1 | Assets & Threat Models | smb | 1-1-1 Threats |
| - what assets are we protecting? | |||
| - from what kinds of attackers? | |||
| .. kiddies | |||
| .. financial gain | |||
| .. nation state (you're dead) | |||
| Session 2 | Threat Pragmatics | smb | 1-2 Pragmatics |
| - to network infrastructure (routing, wiretap, ...) | |||
| - to service infrastructure (dns, mail, ...) | |||
| -to users | |||
| Session 3 | Cryptography | smb | 1-3 Cryptography |
| - symmetric encryption | |||
| - asymmetric encryption | |||
| - digital signatures | |||
| - hash functions | |||
| - certificates & trust anchors | |||
| - random number generation | |||
| Day 2 | |||
| Session 1 | Cryptography Applications / PGP | ||
| - gpg | patrick | 2-1-1 PGP :: 2-1-1 PGP Lab | |
| Session 2 | Cryptography Applications | ||
| - ssh | randy | 2-2-1 SSH | |
| - vpns, IPsec, TLS | pappu & sheryl | 2-2-2 VPN-IPsec-TLS | |
| Session 3 | Network Infrastructure | ||
| - router and switch protection | randy | 2-3-1 Protecting Routers and Switches | |
| - filtering at the border | pappu & sheryl | 2-1-2 Netowrk Infrastructure | |
| - configuration & archiving | randy | 2-3-3 Archiving | |
| Session 4 | Network Infrastructure contd. | ||
| - Routing Protocol Protection | randy | 2-4-1 Routing Protocols 2-4-1 RPKI-Lab | |
| Day 3 | |||
| Session 1 | Topic description | ||
| - Sick Host Detection | patrick | 2-2-2 Sick Hosts | |
| - Logging and Monitoring | maz & pappu | 2-3-1 Logging-monitoring | |
| - IDS theory | maz & pappu | 2-3-2 IDS Theory | |
| - IDS pragmatics - snort | patrick | 2-3-3 Snort Pragmatics | |
| - anomaly detection | maz & pappu | 2-3-4 Anomalies | |
| - firewalls | maz & pappu | 2-3-5 Firewalls | |
| Session 2 | DNS | ||
| - DNS: auth, slave, cache | patrick & sheryl | 2-4-1 Securing DNS | |
| - DNS Server Protection | patrick & sheryl | 2-4-2 DNSSEC | |
| - Providing DNSsec | patrick & randy | 2-4-3 OpenDNSSEC | |
| - DNS Rate Limiting | randy | ||
| - Validating/Using DNSsec | patrick & sheryl | ||
| Session 3 | Protecting Hosts from Net | pappu, patrick, sheryl | 3-1-1 Hosts |
| - Host hardening | |||
| - Default Services | |||
| - Keeping up to date - patching | |||
| - Get Patches from the Source | |||
| - Mobile Hosts | 3-1-5 Mobile Node Security | ||
| Session 4 | Protecting User Hosts | pappu, patrick, sheryl | |
| - Backup! | |||
| - Authentication Credentials | |||
| - Authentication Services | |||
| - Host-based Firewalls | |||
| - Scanning for Diseases | |||
| Day 4 | |||
| Session 1 | Virus, Mail and Browsing | ||
| - Anti-virus | maz & randy | 3-3-2 Anti-virus | |
| - Safe Mail Practices | maz & randy | 4-1-2 Safer mail | |
| - Safe Browsing Practices | maz & randy | 4-1-3 Safer browsing | |
| Session 2 | Inter-Host Protocols | ||
| - personal encryption of files | pappu | 3-4-1 File encryption | |
| - ssh, rsync, sftp, ... | randy & sheryl | ||
| - Covert Channels, VPNS, TOR, Steganography | pappu & sheryl | 3-4-3 Covert Channels | |
| Session 3 | Plan in Advance | ||
| - Host Forensics & Analysis | everyone | 4-1-1 FreeBSD hack | |
| - Network Forensics & Analysis | maz & sheryl | 4-1-2 Network Forensics | |
| - Incident Reporting and Pre-approvals | sheryl | 4-1-3 Incident Reporting | |
| - Post Mortem | pappu, maz & sheryl | ||
| - Wipe, Recover, Replace | maz & sheryl | 4-1-5 Wipe-etc | |
| - Archives and Remote Fallback | maz & sheryl | 4-1-6 Archive Remote Fallback | |
| Session 4 | Inter-Network Cooeperation | maz & sheryl | |
| - NOGs, CSIRT | 4-2 Inter-network Cooperation | ||
| - Security Communities | 4-2-2 Inter-network Cooperation | ||
| Day 5 | |||
| Session 1 | People | maz & sheryl | |
| Dealing with LEO | pappu | 4-3-2 Leo | |
| Session 2 | Planning for the Future | pappu | |
| Session 3 | Atlas Probes | randy | 5-3-1.AtlasProbes.pdf Atlas Probes |
| Misc | |||
| Support docs | Editors, SSH, ... |
Last modified 5 years ago
Last modified on Jan 19, 2014, 5:25:37 AM
Attachments (18)
- 1-0-1.intro.pdf (109.5 KB) - added by trac 5 years ago.
- 1-1-1.Threats.pdf (2.1 MB) - added by trac 5 years ago.
- 1-2.Pragmatics.pdf (119.0 KB) - added by trac 5 years ago.
- 1-3.crypt.pdf (541.9 KB) - added by trac 5 years ago.
- 2-1-1.pgp.pdf (228.2 KB) - added by trac 5 years ago.
- 2-2-1.ssh.pdf (1.1 MB) - added by trac 5 years ago.
- 2-2-2.VPN_IPsec_TLS.pdf (1.2 MB) - added by trac 5 years ago.
- 2-3-1.rtrs-switches.pdf (160.1 KB) - added by trac 5 years ago.
- 2-3-3.archiving.pdf (407.5 KB) - added by trac 5 years ago.
- 2-4-1.routing-protocols.pdf (3.0 MB) - added by trac 5 years ago.
- 2-4-1.RPKI-Lab.pdf (1.4 MB) - added by trac 5 years ago.
- 3-1-7.isp-ids.pdf (370.0 KB) - added by trac 5 years ago.
- 3-2-4.dns-rate-limit.pdf (131.9 KB) - added by trac 5 years ago.
- 3-4-2.rsync+sftp.pdf (246.5 KB) - added by trac 5 years ago.
- 4-1-2.safer-mail.pdf (476.2 KB) - added by trac 5 years ago.
- 4-1-3.safer-browsing.pdf (2.2 MB) - added by trac 5 years ago.
- 5-3-1.AtlasProbes.pdf (2.0 MB) - added by trac 5 years ago.
- 2-1-1.pgp-lab.html (40.5 KB) - added by trac 5 years ago.
