Workshop

Internet Resource Management and Network Security

Start
09:00 - 14 June 2017
End
17:30 - 16 June 2017
Location
Mongolia
Ulaanbaatar
Venue to be advised

Register now

Synopsis

The objective of this workshop is to examine the key concepts, protocols and the policies involved in establishing and maintaining security for a network, and building an understanding and familiarity with their operation. Device and network infrastructure security is examined with a focus on different layers to establish a robust, stable and secure network and protect the data and processes that occur in the network.The workshop also looks at the nature and structure of network attacks and the motivation that drives such on-line malicious activity.The course further examines the actions and processes that can be used to identify, mitigate and respond to such attacks.

Fees

  • Early-bird (20% off): MNT 350,000 / AUD 192 for APNIC members
  • Early-bird (20% off): MNT 524,000 / AUD 288 for non-members
  • Early-bird fees end on 24 May 2017 (fee must be paid by this date)
  • Standard (Pay onsite – Cash only): MNT 437,000 / AUD 240 for APNIC members
  • Standard (Pay onsite – Cash only): MNT 656,000 / AUD 360 for non-members

Target audience

Engineers, Network Managers and Operators, Security policy makers who are interested in network security and gaining an understanding of the threats they face and how to mitigate such threats.

Prerequisites

It is assumed that participants have a basic understanding of network operations and Internet technologies.

Course outline

  • Internet Resource Management:
    • Introduction to APNIC
    • APNIC Whois Database
    • MyAPNIC
  • Network Security:
    • Network Security Fundamentals
    • Security in layers
    • Anatomy of an attack
    • Attack types
    • Identification and mitigation
    • Trends
    • Security Protocols
    • Cryptography and applications
    • IPsec
    • PGP
    • SSL
    • Host protection
    • Server hardening
    • Network devices
    • Filtering and ACLs
    • RPKI
    • Network analysis and forensics
    • Honeypots
    • Incident reporting and response

Other requirements

Participants are advised to bring their own laptop computers for hands-on lab exercises.

Maximum number of attendees

40 participants per workshop

Please note

Certificate of participation is provided upon successful completion of the course.