Network Security and Packet Analysis workshop, btNOG 6

By on 28 May 2019

Category: Events

Tags: , , , ,

Blog home

APNIC Trainer, Tashi Phuntsho, will deliver a four-day Network Security with Packet Analysis workshop at btNOG 6, from 4 to 7 June 2019 in Paro, Bhutan.

Register now to secure your spot.

This technical workshop is targeted at engineers, network managers and operators, and security policy makers who are interested in network security and want to gain an understanding of the threats they face and how to mitigate them.

The objective of this workshop is to examine the elements involved in establishing and maintaining security for a network, and building an understanding and familiarity with network operations. Topics include:

  • Network security fundamentals
  • Vulnerabilities and mitigation on different layers of the TCP/IP stack
  • Cryptography and PKI
  • Device and infrastructure security
  • Operational security and policies
  • Email security
  • Intrusion detection and prevention
  • Packet capture and analysis
  • VPNs
  • IPv6 security
  • Cryptomining/cyrptojacking

It also includes an introduction to packet analysis for those who are performing incident response and investigation. Participants will explore tools such as wireshark, bro, tcpdump and others for dissecting network packets related to security incidents.

Participants are advised to bring their own laptop computers with high-speed Wi-Fi (802.11a/g/n/ac) and administrative access to the laptop’s system. It is also recommended that laptops have an Intel i5 or i7 processor, >=8GB of RAM and 30GB of free hard disk space.

For further details, please visit the btNOG 6 event webpage.

We look forward to seeing you there!

Rate this article

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of APNIC. Please note a Code of Conduct applies to this blog.

Leave a Reply

Your email address will not be published. Required fields are marked *

Please answer the math question * Time limit is exhausted. Please click the refresh button next to the equation below to reload the CAPTCHA (Note: your comment will not be deleted).

Top