Network Security Workshop

When: Tuesday, 21 - Saturday, 25 August 2012
Time: 09:00 - 17:00 (UTC +7)
Where: Meeting Room 2 & 3, Level 2, NagaWorld
Instructor(s): Champika Wijayatunga, APNIC
Peter Losher, ISC

Synopsis

The objective of this workshop is to examine the elements involved in establishing and maintaining security for a network, and building an understanding and familiarity with their operation.

Device and network infrastructure security is examined with a focus on establishing a robust, stable, and secure network while protecting the data and processes that occur in the network.

The workshop also looks at the nature and structure of network attacks and the motivation that drives such online malicious activity. The types of tools that are used in modern attacks, who is behind them, and the impact they have are also discussed. The course further examines the actions and processes that can be used to identify, mitigate, and respond to such attacks. The role and impact of botnets will also be discussed in detail covering botnet operation, functionality, and control.

The workshop will also discuss the DNS vulnerabilities and how to mitigate those by various DNS Security mechanisms, such as TSIG and DNSSEC.

Target audience

Engineers, Network Managers and Operators, Security policy makers who are interested in network security and gaining an understanding of the threats they face and how to mitigate such threats.

Course Outline

  • Network Security Fundamentals
  • - Cryptography
    - Infrastructure security
    - Monitoring and managing access
    - Point protection
    - ACLs
    - Edge protection
  • Network Analysis and Forensics
  • - Understanding TCP/IP
    - Forensics fundamentals
  • Anatomy of a network attack
  • - Miscreants, motivations and misconceptions
    - Modern attacks
    - Botnets
    - DDoS & botnet financials
    - Trends
  • DNS Security
  • - DNS vulnerabilities
    - DNS security mechanisms (TSIG, DNSSEC)

Prerequisites

It is assumed that participants have a basic understanding of network operations and Internet technologies.
Note: Participants are required to bring a laptop.