Session | Time |
---|---|
Session 1 | 09:00 - 10:30 |
Tea | 10:30 - 11:00 |
Session 2 | 11:00 - 12:30 |
Lunch | 12:30 - 13:30 |
Session 3 | 13:30 - 15:00 |
Tea | 15:00 - 15:30 |
Session 4 | 15:30 - 18:00 |
Instructor | Name | Affiliation | Country |
---|---|---|---|
bhumika | Bhumika Sapkota | Classic Tech Pvt Ltd | Nepal |
cristel | Cristel Pelsser | Uni Strasbourg | France |
keiichi | Keiichi Shima | Internet Initiative Japan | Japan |
patrick | Patrick Okui | Network Startup Resource Center | Uganda |
randy | Randy Bush | Internet Initiative Japan | Japan |
Arrcus | United States |
You have around 20 minutes to contain a Russian APT attack Note that they do not include NSA, GCHQ, Mossad, ... :)
pfSense, a free Firewall, VPN, ... solution.
Some time during the week, watch Haroon Meer's excellent keynote, Learning the wrong lessons from Offense, from the t2’16 Infosec Conference in Helsinki.
Spyin’ NSA - by Keith Alexander, Daniel J. Bernstein, Timo Kasper, Tanja Lange, and Peter Schwabe
Day/Session | Topic | Instructor | Material |
---|---|---|---|
Day 1 | Topic | Instructor | Materials |
Session 0 | Intro | randy | 1-0-1 Intro |
- admin | |||
- agenda | |||
- materials and resources | |||
- facilities and wireless | |||
Session 1 | Assets & Threat Models | cristel | 1-1-1 Assets, Threats, Pragmatics |
- what assets are we protecting? | |||
- from what kinds of attackers? | |||
.. kiddies | |||
.. financial gain | |||
.. nation state (you're dead) | |||
Threat Pragmatics | |||
. to network infrastructure (routing, wiretap, ...) | |||
. to service infrastructure (dns, mail, ...) | |||
. to users | |||
Social Engineering | |||
Session 2 | Cryptography | randy | 1-2-1 Crypto Overview |
- symmetric encryption | |||
- asymmetric encryption | |||
- digital signatures | |||
- hash functions | |||
- certificates & trust anchors | |||
Session 3 | Cryptography Applications / PGP | patrick | |
- checksum | patrick | 1-3-1 checksum | |
1-3-1 hello-unix.dat | |||
1-3-1 hello-win.dat | |||
- PGP Lab | patrick | 1-3-2 PGP | |
1-3-2 email-header | |||
1-3-2 mailvelope | |||
Session 4 | Cryptography Applications | ||
- ssh | cristel | 2-1-1 SSH | |
- ssh lab | keiichi | 2-1-2 SSH Lab 2-1-2 SSH Lab 2 |
|
Day 2 | Topic | Instructor | Materials |
Session 1 | Wireshark | cristel | 2-2-1 wireshark |
- wireshark lab | cristel | 2-2-2 wireshark lab | |
Session 2 | DNS & DNS Security | ||
- DNS | cristel keiichi |
3-3-1 DNS 3-3-1 DNS Lab 3-3-1 WWW Lab |
|
- DNS Security | patrick keiichi |
3-3-2 DNS Security 3-3-2 DNS Security Lab |
|
Session 3 & 4 | PGP signing party | patrick | 2-3-1 PGP Key signing party lab |
OpenVPN | randy | 2-4-1 OpenVPN | |
Day 3 | Topic | Instructor | Materials |
Session 1 | Network Infrastructure | bhumika | 3-1-1 securing network |
Session 2 | nmap | keiichi | 3-4-1 scanning 3-4-1 scanning Lab |
Session 3 | anomaly and firewalls | ||
- anomaly | bhumika | 3-2-1 anomaly | |
- firewalls | 3-2-2 firewalls | ||
Session 4 | Cryptography Applications | patrick | |
- VPNs, IPsec, TLS | 2-3-1 VPN IPsec TLS | ||
OpenVPN & pfSense | randy | 3-4-2-openvpn-lab | |
Session 5 | IDS | ||
- IDS pragmatics - snort | cristel | 4-1-1.ids | |
Day 4 | Topic | Instructor | Materials |
Session 1 | IDS | ||
- IDS pragmatics - snort | cristel | 4-1-1.ids Hands-on | |
Session 2 | Protecting Hosts from Net | bhumika | |
- clients | 4-2-1 Hosts | ||
Session 3 | Covert Channels, TOR, Steganography | cristel | 5-1-2 Covert Channels |
Filtering lab | keiichi | Filtering lab (UFW) | |
Session 4 | Safer Mail and Browsing | ||
- Safe Mail Practices | randy | 4-4-1 Safer Mail | |
- Safe Browsing Practices | randy | 4-4-2 Safer browsing | |
- File & Disk Encryption | randy | 4-4-3 File & Disk Encryption | |
DNS Rate Limiting | randy | 4-4-5 DNS Rate Limiting | |
workshop setup | keiichi | workshop setup how to build the testbed |
|
Telco vs Internet & Complexity | randy | Telco vs Internet & Complexity | |
Complexity and Critical Infrastructure | randy | Complexity and Critical Infrastructure | |
Day 5 | Topic | Instructor | Materials |
Session 1 | Communities and cooperation | tashi | 5-2-1 cooperation |
Session 2 | Protecting Routing Protocols | randy | Protecting Routing Protocols |
Session 3 | RPKI lab | patrick | RPKI origin validation lab |
Session 4 | Dessert | randy | |