Workshop

Network Security workshop

Start
09:00 - 05 September 2019
End
17:30 - 09 September 2019
Location
Thailand
Chiang Mai
Le Meridien Chiang Mai
108 Chang Klan Road
Tambol Chang Klan
Amphur Muang,
Chiang Mai 50100

Register now

Synopsis

The objective of this workshop is to examine the key concepts, protocols and the policies involved in establishing and maintaining security and building an understanding and familiarity with their operation. Device and Network infrastructure security is examined with a focus on different layers to establish a robust, stable and secure network and protect the data and processes that occur in the network.

The workshop also looks at the nature and structure of network attacks.

The course further examines the actions and processes that can be used to identify, mitigate and respond to such attacks.

Fees

This workshop will be held at APNIC 48, please visit the event website for full details and to register: https://conference.apnic.net/48/

Target audience

Engineers, IT Managers and Operators, and Security Policy Makers who are interested in information security, gaining an understanding of the threats they face and how to mitigate such threats.

Prerequisites

It is assumed that participants have a basic understanding of network operations and Internet technologies.

Course outline

  • Threat Models
    • Types of Attackers
    • Network Infrastructure
    • Service Infrastructure (e.g. DNS, email)
    • Users
  • Network Infrastructure
    • Router and Switch Protection
    • Routing Protocol Protection
    • Detecting Sick Hosts and Walling Them
  • Infrastructure Services
    • IDS
    • Firewalls
    • IPv6 Security
    • Anomaly Detection
    • RPKI
  • End User Hosts
    • Mac, Unix, and Linux
    • Keeping Up to Date – Patching
    • Host Based Firewalls
    • Authentication Services
    • PKI Services
    • Checking for Disease: Scanners
    • Preventing Disease: Anti-virus
    • Safe Mail Practices
    • Safe Browsing Practices in Firefox, Chrome, Safari
    • Safe Inter-host Protocols: SSH, RSVC, SFTP and more
    • Personal Encryption of Files and Communications
  • Administrative
    • Security Plan
    • Inter-network Cooperation
      • NOGS
      • CERT
      • FIRST
  • Planning for Future Changes

Other requirements

Participants are advised to bring their own laptop computers with high-speed Wi-Fi (802.11a/g/n/ac) and administrative access to system. It is also recommended that laptops have Intel i5 or i7 processor, >=8GB of RAM, 30GB of free hard disk space, and a 64-bit operating system (Windows, Linux, or Mac OS X). Participants are requested to pre-install VirtualBox (free), or VMware Workstation (paid or trial), although installation files will be available at the beginning of the course.