wiki:Agenda

Agenda

AIT Security Workshop

Time Schedule

Session 1 09:00 - 11:00
Break 11:00 - 11:30
Session 2 11:30 - 13:00
Lunch 13:00 - 14:00
Session 3 14:00 - 15:30
Break 15:30 - 16:00
Session 4 16:00 - 18:00

Instructors

randy Randy Bush Internet Initiative Japan Japan
steve Steven Bellovin Columbia University USA
patrick Patrick Okui Network Startup Resource Center (NSRC) Uganda
maz Yoshinobu (Maz) Matsuzaki Internet Initiative Japan Japan
merike Merike Kaeo DoubleShot Security United States
kk Kanchana Kanchansut AIT Thailand

References materials available here?.

Day 1 Topic Inst Presentations
Session 0 Intro randy 1-0-1 Introduction
- admin kk
- agenda randy
- materials and resources randy
- facilities and wireless randy
Session 1 Assets & Threat Models smb & merike 1-1-1 Threats
- what assets are we protecting?
- from what kinds of attackers?
..kiddies
.. financial gain
.. nation state (you're dead)
Session 2 Threat Pragmatics smb & patrick1-2 Pragmatics
- to network infrastructure (routing, wiretap, ...)
- to service infrastructure (dns, mail, ...)
- to users
Session 3 Cryptography merike & smb 1-3-1.cryptography
- symmetric and asymmetric keys
- encryption
- signing
Session 4 Cryptography Applications randy
- ssh randy & patrick 1-4-1 ssh
- vpns, IPsec, TLS merike & patrick 1-4-2 VPNs-IPsec-TLS
- gpg merike & patrick 1-4-3 PGP
Day 2
Session 1 Network Infrastructure merike &randy 2-1-1 Protecting Routers and Switches
- router and switch protection 2-1-2 NetworkInfrastructure
- filtering at the border
- configuration & archiving 2-1-3.archiving
Session 2 Network Infrastructure contd.
- Routing Protocol Protection randy & smb 2-2-1 Protecting Routing Protocols 2-2-1.cisco-lab
- Sick Host Detection patrick 2-2-2 Detecting Sick Hosts
Session 3 Infrastructure Services
- Logging and Monitoring maz & smb 2-3-1 logging-monitoring
- IDS theory maz & smb 2-3-2 ids theory
- IDS pragmatics - snort patrick 2-3-3 snort pragmatics
- anomaly detection maz & smb smb-2-3-5.anomalies
- firewalls maz & smb smb-2-3-4 firewalls
Session 4 DNS merike & patrick 2-4-1 DNS Security
- DNS: auth, slave, cache merike & patrick
- DNS Server Protection merike & patrick 2-4-2 DNS security
- Providing DNSsec patrick & randy 2-4-3.opendnssec
- Validating/Using DNSsec merike & patrick
Day 3
Session 1 Protecting Hosts from Net smb, merike, patrick 3-1-1.hosts
- Host Hardening
- Default Services
- Keeping up to date - patching
- Get Patches from the Source
- Mobile Hosts merike 3-1-5.MobileNode_Security
Session 2 Protecting User Hosts smb, merike, patrick
- Backup!
- Authentican Credentials
- Authentication Services
- Host-based Firewalls
- Scanning for Diseases
Session 3 Virus, Mail, and Browsing
- Anti-virus maz & randy 3-3-1.anti-virus
- Safe Mail Practices maz & randy 3-3-2.safer-email
- Safe Browsing Practices maz & randy 3-3-3.safer-browsing
Session 4 Inter-Host Protocols
- personal encryption of files smb 3-4-1.file-encrypt
- ssh, rsync, sftp, ... randy & merike
- Covert Channels, VPNs, TOR, Steganography merike & randy 3-4-3.Covert_Channels
Day 4
Session 1 Plan in Advance
- Host Forensics & Analysis everyone 4-1-1 freebsd hack
- Network Forensics & Analysis merike & maz 4-1-2 Network Forensics
- Incident Reporting and Pre-Approvals merike 4-1-3 Incident Reporting
- Post Mortem smb, merike & maz
- Wipe, Recover, Replace maz & merike 4.1.5 wipe recover replace
- Archives and Remote Fallback maz & merike 4-1-6 Archive and Remote Fallback
Session 2 Inter-Network Cooperation maz & merike
- NOGs,CSIRT 4-2 Inter-Network Cooperation
- Security Communities 4-2-2 Inter-Network Cooperation
Session 3 People merike & maz
Dealing With LEO smb 4-3-2 leo
Session 4 Planning for the Future smb
Last modified 7 years ago Last modified on Nov 23, 2012, 2:16:14 AM