Day 1
Session 1 - Intro to Security & Cryptography
This session introduces important security concepts, attacks and threat pragmatics, security
controls, and cryptography. This session also examines different attack surfaces and common
defences for different layers of the TCP/IP stack.
Session 2 - Device & Infrastructure Security
Infrastructure security is about protecting critical assets (hardware and software), network
and systems. This session provides relevant and fundamental device protection and best
practices in securing access to the network and protocols.
Session 3 & 4 - Packet Analysis
Packet analysis involves capturing live data over the network and analysing them for detecting
network issues, monitor potential misuse or intrusion attempts, examine security problems,
or simply learn about network protocols. This session introduces tools like Wireshark and Zeek
for packet analysis.
Day 2
Session 1 - Intrusion Detection & Suricata
Threat detection is an important component of security. Intrusion Detection Systems provides
an alert system, identifying possible attacks and informs the security admin. This session
introduces Suricata, an open-source threat detection and network analysis software.
Session 2 - DDoS Attacks & Countermeasures
Denial of service attacks are difficult to address. DDoS attacks can happen to anyone and can
have adverse impact on the target's operations and service availability. This session discusses
DDoS attacks and worldwide trends, along with different mitigation strategies that can be
implemented.
Session 3 - BGP Route Hijack, Leak Detection & Prevention
BGP mishaps such as malicious route hijacking, mis-origination (fat fingers), and bad filters
(route leaks) are very common and frighteningly very easy. We need better mechanism(s) to
ensure false information is not injected into the global routing system. This session discusses
how BGP hijacks are easily implemented and show real-world incidents that had major impact
to the global internet.
Session 4 - Secure Internet Routing (RPKI)
Building up on the previous session, this session will look at current route filtering
tools/techniques and the current best practices for securing the internet routing. The focus is
on RPKI implementation, ROA creation, and setting up of an RPKI validator.