The following application was submitted (UTC) on Wed, 16 Feb 11 12:46:35 +0000
Items with an '*' were required items in the application form.
PERSONAL INFORMATION
====================
Family Name (Last name, Surname)*: RUTABOBA
Full Name*: RAYMOND
Employer/Organization*: kigali institute of science and technology (kist)
Position/Title*: IT PROFFESIONAL
Business Address
----------------
BP 3900 KIGALI
Business Phone: +250 728640865
Alternate Telephone: +250 788640865
Email*: r.rutaboba@kist.ac.rw
URL: www.kist.ac.rw
FAX: +250 252571924
Date of Birth: 26th 06/1980
Country of Residence*: RWANDA
Passport Name: RUTABOBA RAYMOND
Passport Number: RW13598726584
Passport Issuing Country: RWANDA
Passport Issue Date: 2008-02-12
Passport Expiry Date: 2013-02-11
WORKSHOP SPECIFIC INFORMATION
=============================
Workshop Applied For*: NM-E: Network Monitoring and Management
Reason for Track Choice*
------------------------
I WOULD LIKE TO LEARN NETWORK MONITORING AND MANAGEMENT SIMPLY BECAUSE,IT WILL HELP ME TO MANAGE AND MONITOR THE NETWORK WHERE I WORK AND IN MY CAREER.
TECHNICAL SKILLS
================
Unix User?*: true
How much have you used it?
--------------------------
* Unix Network Security
Once you put a computer on a network, you allow many more people potential access to the machine.
* Unix Account Security
If your accounts are not secure, then your other steps won't help much. There is general password security as well as special steps to take for each type of account.
* Unix File System Security
File system security is about making sure your users can only do what you want them to be able to do.
* Unix Security Testing
Unix Security is an ongoing process...
* Unix Security Websites
A list of resources to keep your Unix system secure.
* Unix Security Checklist
This document provides a Unix security checklist to help system administrators secure their systems.
Have you been a UNIX admin?*: true
Describe your experience (length of time, versions, etc.)
---------------------------------------------------------
* Unix Network Security
Once you put a computer on a network, you allow many more people potential access to the machine.
* Unix Account Security
If your accounts are not secure, then your other steps won't help much. There is general password security as well as special steps to take for each type of account.
* Unix File System Security
File system security is about making sure your users can only do what you want them to be able to do.
* Unix Security Testing
Unix Security is an ongoing process...
* Unix Security Websites
A list of resources to keep your Unix system secure.
* Unix Security Checklist
This document provides a Unix security checklist to help system administrators secure their systems.
Have you used/administered TCP/IP nets?*: true
Describe
---------
# TCP/IP terminology
It useful to become familiar with the following Internet terms as they are used in relation to TCP/IP.
# Planning your TCP/IP network
Because TCP/IP is such a flexible networking tool, you can customize it to fit the specific needs of your organization.
# Installation of TCP/IP
This is the Installation of Transmission Control Protocol/Internet Protocol (TCP/IP).
# Configuration of TCP/IP
After the TCP/IP software is installed on your system, you are ready to begin configuring your system.
# Authentication and the secure rcmds
These commands have been enhanced to provide additional authentication methods to those used today.
# TCP/IP customization
To customize TCP/IP, create a .netrc file.
# Methods for communicating with other systems and users.
Two methods are; The first method is by connecting a local host to a remote host. The second method is by conversing with a remote user.
# File transfers
Although it is possible to send relatively short files using electronic mail, there are more efficient ways of transferring large files.
# Printing files to a remote system
If you have a local printer attached to your host, then the following procedures refer to printing to a remote printer. If you have no local printer, then the following procedures refers to printing to a nondefault remote printer.
# Printing files from a remote system
Occasionally, you might need to print a file that is located on a remote host. The location of the printout depends upon which remote printers are available to the remote host.
# Displaying status information
You can use TCP/IP commands to determine the status of a network, display information about a user, and resolve host information needed to communicate to another host or user.
# TCP/IP Protocols
Protocols are sets of rules for message formats and procedures that allow machines and application programs to exchange information. The TCP/IP suite of protocols can be understood in terms of layers (or levels).
# TCP/IP local area network adapter cards
The network adapter card is the hardware that is physically attached to the network cabling. It is responsible for receiving and transmitting data at the physical level.
# TCP/IP network interfaces
The TCP/IP Network Interface layer formats IP datagrams at the Network layer into packets that specific network technologies can understand and transmit.
# TCP/IP addressing
TCP/IP includes an Internet addressing scheme that allows users and applications to identify a specific network or host with which to communicate.
# TCP/IP name resolution
Although 32-bit Internet addresses provide machines an efficient means of identifying the source and destination of datagrams sent across an internetwork, users prefer meaningful, easily remembered names. Transmission Control Protocol/Internet Protocol (TCP/IP) provides a naming system that supports both flat and hierarchical network organizations.
# Planning and configuring for LDAP name resolution (IBM SecureWay Directory schema)
# Planning and configuring NIS_LDAP name resolution (RFC 2307 schema)
AIX� 5.2 offers a new naming mechanism called NIS_LDAP.
# TCP/IP address and parameter assignment - Dynamic Host Configuration Protocol
Transmission Control Protocol/Internet Protocol (TCP/IP) enables communication between machines with configured addresses. The Dynamic Host Configuration Protocol (DHCP) gives the network administrator a method to remove the end user from this configuration problem and maintain the network configuration in a centralized location.
Have you set up and/or administered any of the following? Please give details
Bind or any other Nameservers*
------------------------------
I have never
Mail Transport Agents (ex. Sendmail, Exim, Postfix, Qmail)*
-----------------------------------------------------------
I have never
Mailing List Managers (e.g. Majordomo or other list manager)*
-------------------------------------------------------------
I have never
Web Systems/Servers (e.g. Apache, IIS or other web server)*
------------------------------------------------------------
I have never
Have you configured or otherwise managed any of the following? Please give details.
Routers*
--------
-Name the router.
-Secure the Console Port, Auxiliary Port, and VTY lines.
-Set an enable secret password.
-Assign IP addresses and enable interfaces.
-Save the configuration.
Switches*
---------
-creating VLANS
Network Monitoring Systems*
----------------------------
I have never
Network Operations Center (NOC)*
--------------------------------
I have never
CERT WORKSHOP APPLICANTS ONLY
=============================
Which area of security interests you?
-------------------------------------
-Network Monitoring
What security interventions have you experienced?
-------------------------------------------------
-Network Monitoring & Management
How do you intend to use the knowledge gained at the workshop?
--------------------------------------------------------------
Network Monitoring & Management of a network where i work.
ROLE IN NATIONAL NETWORKING ACTIVITIES
======================================
A description of your current employer, your position, your duties and
responsibilities, and how they relate to current and future data
networking activities in your country*
-----------------------------------------------------------------------
Kigali Institute of science and technology IT professional.
maintaining the network easily accessible to the users
A brief description of your computing and networking environment (operating systems,
networking software, modems, etc.), including the connectivity of your organization
to the Internet and your country's connectivity to the international Internet*
------------------------------------------------------------------------------------
we are using flat network,using microsoft operating systems to end users,and unix servers
Scope of your institution (check all categories that apply)*
------------------------------------------------------------
Academic Network Provider
:
Approximate number of full time staff at your institution*
----------------------------------------------------------
1000
How your training and current work prepare and qualify you for the track you wish to attend*
--------------------------------------------------------------------------------------------
It will help me to maintain the network of the institute,
How you expect to use the knowledge you gain at the workshop after you return to your country*
----------------------------------------------------------------------------------------------
It will help me to maintain the network of the institute to the
If you have previously attended AfNOG or INET Workshops for Developing Countries
Year and track you attended
---------------------------
2010 unix system and administration
A precise description of how you have used the training you have received in the past
-------------------------------------------------------------------------------------
-using VI editor
-using nagious software
-cact
The significant advances in networking which have occurred in your country specifically
because of your knowledge and effort
---------------------------------------------------------------------------------------
hacking is possible
FINANCIAL INFORMATION
======================
Are you are requesting financial aid from the AfNOG Workshop for attending the
workshop and meetings, or for travel costs?*
------------------------------------------------------------------------------
No financial assistance requested.
REFEREES
========
First Referee*
--------------
MURIRO ANICET
muranice@yahoo.fr
Second Referee*
---------------
RUHUMULIZA CRETUS
rutaray@yahoo.com
END OF APPLICATION