Internet Resource Management and Network Security

09:00 - 20 March 2017
17:30 - 22 March 2017
Brunei Darussalam
Bandar Seri Begawan
The Brunei Hotel
95, Jalan Pemancha

Join the Facebook group.

Register now


The objective of this workshop is to examine the key concepts, protocols and the policies involved in establishing and maintaining security for a network, and building an understanding and familiarity with their operation. Device and network infrastructure security is examined with a focus on different layers to establish a robust, stable and secure network and protect the data and processes that occur in the network.

The workshop also looks at the nature and structure of network attacks and the motivation that drives such on-line malicious activity.

The course further examines the actions and processes that can be used to identify, mitigate and respond to such attacks.


  • Early-bird (20% off): BND 200 / AUD 192 for APNIC members
  • Early-bird (20% off): BND 290 / AUD 288 for non-members
  • Standard (Pay onsite – Cash only): BND 240 / AUD 240 for APNIC members
  • Standard (Pay onsite – Cash only): BND 370 / AUD 360 for non-members
  • Early-bird fees end on 24 February 2017 (fee must be paid by this date)

Target audience

Engineers, Network Managers and Operators, Security policy makers who are interested in network security and gaining an understanding of the threats they face and how to mitigate such threats.


It is assumed that participants have a basic understanding of network operations and Internet technologies.

Course outline

  • Internet Resource Management:
    • Introduction to APNIC
    • APNIC Whois Database
    • MyAPNIC
  • Network Security:
    • Network Security Fundamentals
    • Security in layers
    • Anatomy of an attack
    • Attack types
    • Identification and mitigation
    • Trends
    • Security Protocols
    • Cryptography and applications
    • IPsec
    • PGP
    • SSL
    • Host protection
    • Server hardening
    • Network devices
    • Filtering and ACLs
    • RPKI
    • Network analysis and forensics
    • Honeypots
    • Incident reporting and response

Other requirements

Participants are advised to bring their own laptop computers for hands-on lab exercises.

Maximum number of attendees

40 participants per workshop

Please note

Certificate of participation is provided upon successful completion of the course.

Local Contact

Lisa Corness