Skip to main content
Skip to main content
APNIC 62 Home
MUMBAI, INDIA
4 – 10 September 2026

APNIC Academy Training

  1. Network Automation Workshop (Train-the-trainer)
  2. Network Security Workshop

Network Automation Workshop (Train-the-trainer)

Instructors:

Dave Phelan, Makito Lay

Synopsis

This workshop is designed to strengthen participants’ foundational knowledge on Network Automation and enable confident application in day-to-day network operations. As modern networks continue to scale in size and complexity, the transition from manual processes to structured, automated workflows is important to improve consistency, efficiency, and reliability.

Building on core automation principles, the workshop introduces key architectural concepts such as the SALT (State, Abstraction, Layering, and Topology) framework, which helps participants understand how to design scalable and maintainable automation systems. Attendees also gain hands-on experience with data modeling and templating techniques, including the use of YAML for structured data representation and Jinja for dynamic configuration generation. Practical lab exercises reinforce concepts such as device provisioning, configuration management, and validation workflows.

By the end of the workshop, attendees are equipped with the skills to design, implement, and maintain automated network solutions using industry-relevant tools and methodologies.

Target Audience

This course is intended for senior network engineers, network architects, and network operators seeking to deepen their expertise in network automation. It is particularly suited to professionals who want to build advanced skills in applying automation frameworks, data models, and tooling to improve network consistency, scalability, and operational efficiency. Participants should have a solid understanding of networking concepts and looking to transition towards programmable, software-driven network practices.

Pre-requisites

It is assumed that participants have an excellent understanding of:

  • Network operations, Internet technologies, OSI reference model and TCP/IP.
  • Basic command line (CLI) skills (Linux and at least 1 Router Operating System).
  • Familiar with YAML syntax.

We require the following Academy courses be completed before the start of the tutorial:

Course Outline

  • Introduction to Automation
  • The 3 W’s of Automation
  • Introduction to Salt
  • Introduction to YAML and Jinja
  • Configuration Management using Salt
  • Salt States: Advanced Configuration Management
  • Parsing Output Using TextFSM
  • The Salt Event Bus
  • Napalm Logs
  • The Salt Reactor
  • Salt Rest API
  • Building a Device inventory
  • Extending Salt in your own environment

Other Requirements

  • Participants are advised to bring their own laptop or desktop computers with high-speed internet access and administrative access to system. It is also recommended that computers have Intel i5 or i7 processor, >=8GB of RAM and 30GB of free hard disk space.
  • Software: SSH Client, Telnet Client (PuTTy)
  • Confirm Secure SHell (SSH) is allowed from the office or home network to access the lab infrastructure. Test SSH connectivity, try to connect to route-views.routeviews.org. For example, from the CLI type: ssh rviews@route-views.routeviews.org

Notes

This workshop is delivered in a Train-the-Trainer (TTT) format and is designed for community champions who plan to deliver training and lead capacity-building initiatives within their local communities. In addition to advancing their technical expertise in network automation, participants will develop practical skills in presentation, facilitation, and instructional delivery. The workshop also equips attendees with the knowledge to set up and manage backend lab environments, enabling them to replicate hands-on training sessions effectively. The program aims to empower participants to confidently train others and scale network automation knowledge within their regions.

Course Website

Network Security Workshop

Instructors:

Shane Hermoso, Awal Haolader

Synopsis

This comprehensive Network Security workshop provides essential knowledge and practical skills for safeguarding modern network infrastructures. The course covers critical aspects of network security, blending theoretical concepts with hands-on application.

Participants will explore key topics including cryptography fundamentals, VPNs, access control mechanisms, packet analysis, DDoS mitigation strategies, intrusion detection systems, and routing security including RPKI. Through a combination of expert instruction and practical lab exercises, attendees will learn to identify vulnerabilities, architect secure networks, and implement effective monitoring solutions.

By the end of this workshop, participants will be well-equipped to address the complex challenges of network security in their organizations, armed with both the understanding and practical skills to enhance their network's defenses against evolving threats.

Target Audience

Network and System Engineers and IT Managers who are interested in security practices and want to gain an understanding of network and cyber security.

Ideal participants have a basic understanding of networking concepts and are looking to enhance their knowledge of network and cybersecurity practices.

Pre-requisites

It is assumed that participants have a basic understanding of network operations, Internet technologies, OSI reference model and TCP/IP. In particular, you should be able to:

  1. Use a command line interface to configure routers, switches and servers.
  2. Basic Linux command line (CLI) skills.
  3. Use the vi or nano or any other text editor for Linux

Academy resources to be completed before start of workshop

  1. Cybersecurity Fundamentals

Course Outline

  • Network Security Fundamentals
  • Cryptography
  • Infrastructure Security
  • DDoS Attacks and Countermeasures
  • Honeypots and Honeynet
  • Packet Analysis
  • Intrusion Detection with Suricata
  • Flow Monitoring & Log Management
  • BGP Operational Security
  • DNS Security
  • Routing Security with RPKI
  • IPv6 Security Considerations
  • IPsec VPN

Other Requirements

  • Participants are advised to bring their own laptop or desktop computers with high-speed internet access and administrative access to system. It is also recommended that computers have Intel i5 or i7 processor, >=8GB of RAM and 30GB of free hard disk space.
  • Software: SSH Client, Telnet Client (PuTTy)
  • Confirm Secure SHell (SSH) is allowed from the office or home network to access the lab infrastructure. Test SSH connectivity, try to connect to route-views.routeviews.org. For example, from the CLI type: ssh rviews@route-views.routeviews.org

Course Website