System and Network Security Workshop Agenda

Session 1 09:30 - 11:00
Session 2 11:30 - 13:00
Session 3 14:30 - 16:00
Session 4 16:30 - 18:00

* The above schedule is in Bangladesh Standard Time (UTC+6) *

FL Name Email Organisation Country
SK Suman K Saha ADN Telecom Ltd Bangladesh
SS Shaila Sharmin BRAC Bank Ltd Bangladesh
SP Swapneel Patnekar swapneel(at)brainattic(dot)in APNIC Community Trainer India
MZ Yoshinobu Matsuzaki maz(at) IIJ Japan

Ask Questions here - Expires 15th Jul 2022
View Questions here

Session Topic Trainer Presentations Exercises Other Resources
Session 1 Agenda
Security in Layers
Crypto Basics

Security in Layers
Crypto Basics Network Security Trends Nov 2021 to Jan 2022
25% of Internet users vulnerable to infrastructure attack
Diffie-Hellman Key Exchange - Youtube
Cyber Chef
Session 2 & 3 SSH Lab
2FA Lab
Hashing Lab
SK Secure Shell SSH LAB
Two Factor Authentication
Hashing Lab
Telnet for Mac
Microsoft File Checksum
Google Auth plugin
Session 4 IPsec VPN SS VPN and IPsec Deploying IPSec (Academy Lab)
IPsec Lab (Site-to-Site)
IPsec Lab (Packet Tracer)
Deploying IPSec (Academy Lab)
Session 1 Distributed Denial of Service (DDoS)
Attacks and Countermeausures
Generating, Capturing and Analyzing DoS
and DDoS-centric Network Traffic
Session 2 Honeypots SK HoneyPots Setup Cowrie Cowrie Github Repo
APNIC HoneyNet Project
Session 3 Packet Analysis SP Packet Analysis Lab pcaps
TShark Lab
WireShark Lab
RFC791 - IP
RFC793 - TCP
Telnet pcap
SSH pcap
HTTP pcap
HTTPS pcap
IPv6 pcap
Session 4 Intrusion Detection SK Overview of IDS - Snort Snort lab
SNORT Lab Answer
Update SNORT and review rules
Use nmap to do Xmas tree scan
Bruteforce SSH
Snorpy Web based Rule Creator - snorpy web UI
Blog post about Snorpy
MITRE - Xmas Scan Attack overview
Video - Xmas Scan Attack
APNIC Academy
The Incident Response Hierarchy of Needs
Pyramid of Pain
Session 1 Intrusion Detection SP Overview of Suricata Installation workshop.tar.gz
Session 2 & 3 Investigate Packet captures SP Use Suricata to Analyse Packet Captures
Packet Analysis Tutorial
Session 4 Security Onion SS Session and Signature Analysis Security Onion (Academy Lab)
Security Onion LAB
Security Onion Summary Sheet
TCP Dump commands
TCP dump Lab
Session 1 Route Leak prevention with
BGP Community by
Q S Tahmeed (Level3 Carrier Ltd.)
QT Route Leaks
Session 2 Securing Internet Routing
How to create ROAs (demo)
RPKI — 2021 retrospective
RPKI NLnetlabs
APNIC Route Management
How to Create ROAs in MyAPNIC
Session 3 & 4 Installing RPKI Validators All Routinator
RPKI Prover
Install NLnet Labs Routinator
Install Octo rpki
Install FORT rpki
Install RPKI validator RIPEv3
Filtering with ROAs (Route Origin Validation) Lab All PDF RPKI Virtual LAB
Wrap Up

Additional Resources

Topic Resources
Other resources IDS & SNORT Snorpy Web based Rule Creator
Snort 101
Snort 2 - Installation and Config
Snort 2 - Introduction to Rule Writing
Snort 3 - Introduction and overview
MITRE - Xmas Scan Attack overview
Video - Xmas Scan Attack
WireShark TCP dump summary
TCP dump - 50 ways to isolate traffic
Detecting Network Attacks
Youtube Song - Call Offensive Security
Suricata Online Documentation
Rulesets Getting Started with Suricata-Update: Managing rule sets and sources
An Introduction to Writing Suricata Rules
Suricata Sample data
Other ToolsScirius
Hunting Threats That Use Encrypted Network Traffic with Suricata
EveBox documentation
Using EveBox
Malware Analysis Wireshark tutorial dridex infection traffic
Example malware analysis
Malware and where to find them
Malware Traffic Analysis
SANS Challenge
SANS Ransomware Summit 16th Jun 2022 (free)
RangeForce Community Edition
Packet Analysis &
Threat Intelligence
Threat map
Network and Security trends Trustwave Global trends
Imperva DDoS attack trends 2019
Cisco Networking Trends Report 2020
Cisco Networking Trends Report 2021
European Union Agency for Cybersecurity (ENISA), Threats and Trends
Enisa 2020 Threat Landscape
World Economic Forum, Global Risks
Red Canary 2021 Threat Detection Report - Threats
Red Canary 2021 Threat Detection Report - Techniques
Misc. Cybersecurity Glossary of Terms
Comptia Basic definitions
Biggest Data Breaches
Significant Cyber Incidents
Cybersecurity Reference Architecture
Enisa Network Forensics Handbook
Cybersecurity Best Practices Guide For IIROC Dealer Members
Network Simulation
Networking Lab Images From Arista, Cisco, nVidia
Mitigation ASD mitigation strategies
Using ATT&CK for threat intelligence
Infographic Defense in Depth FAN
CyberSecurity Maturity Model (CSMM)
InfoSec Colour Wheel
Parkerian Hexad
Unified Kill Chain
  • netsec-20220627-bdnog14/agenda.txt
  • Last modified: 2023/01/30 00:48
  • by awal