# Practical Cybersecurity for Internet Operators # * **Date:** 5–8 May 2026 * **Location:** Livingstone, Zambia * **Host:** [ZAMREN](https://zamren.zm/) * **Venue:** [AVANI Victoria Falls Resort](https://www.avanihotels.com/en/victoria-falls/mukuni-boma)
## Workshop ##
* [Detailed workshop agenda](agenda.html) (includes links to presentations and schedule) * [Lab access](http://ws.nsrc.org) (workshop only) * [Participants](participants.html) * [Instructors](instructors.html) * [Reference materials](references.html) * [Sponsors](sponsors.html) * Workshop survey * [Photos](https://photos.nsrc.org/) * [NSRC training videos](https://learn.nsrc.org)
## Workshop description ## A four-day technical workshop consisting of short lectures, tutorials, and hands-on tasks. The course emphasises skills needed to secure Internet infrastructure from real-world cybersecurity threats. ## Target Audience ## This course's target audience includes network engineers from industry, Internet Service Providers, stewards of critical Internet infrastructure (ccTLDs), and operators of research and education networks (RENs) who seek to improve the security, resilience, and reliability of their infrastructure. ## Workshop Topics ## **Participants in this workshop will learn about:** * The onion model and the Swiss cheese model * Defence in depth * Risk analysis * Threat modelling * Principle of least privilege * Service reliability and recovery * Encryption of data at rest and in transit * Authentication and authorisation * Service reliability and recovery * Encryption of data at rest and in transit * Authentication and authorisation * Identity and access management * Multi-factor authentication * Trust domains and security boundaries * Firewalls * Single sign-on * Best practices for cybersecurity on layer 1 and layer 2 * Physical plant security * Authentication, authorisation, accounting, and auditing * Monitoring and running a security operations centre * Best practices for securing critical network services * DNS & KINDNS * Firewalls, intrusion detection systems, etc. * Network monitoring: NOC/SOC separation of concerns * Internet routing security best practices ## Prerequisites ## This workshop assumes robust familiarity with editing files, installing software, and other day-to-day systems administration tasks on Unix-like operating systems or Linux. As well as being experienced systems administrators, participants must have at least a basic understanding of critical networking concepts such as Internet routing and the Domain Name System (DNS). **It is required that the workshop participants:** * Are proficient with a command line interface; * Have day-to-day experience within an operational network; * Are familiar with the Unix or Linux command line interface; * Have basic knowledge of TCP/IP networking; * Are willing and prepared to discuss their own network. **Please note: participants are required to bring laptops** cript>