| Day 1 |
Topic |
Inst |
Presentations |
|
|
|
|
| Session 0 |
Intro |
maz |
|
|
- facilities, admin, agenda and so on |
|
|
| Session 1 |
Assets & Threat Models |
cristel |
Assets, Threats, Pragmatics |
|
- what assets are we protecting? |
|
|
|
- from what kinds of attackers? |
|
|
|
Threat Pragmatics |
|
|
|
Social Engineering |
|
|
| Session 2 |
recap |
maz |
IP protocols |
| Session 3 |
Cryptography |
maz |
Crypto Overview |
|
- symmetric encryption |
|
hello-win.dat hello-unix.dat |
|
- asymmetric encryption |
|
|
|
- digital signatures |
|
|
|
- hash functions |
|
|
| Session 4 |
Cryptography Applications / PGP |
moin |
|
|
- gpg |
|
PGP |
|
- PGP Lab |
moin |
PGP Lab |
|
|
|
|
| Day 2 |
Topic |
Inst |
Presentations |
|
|
|
|
| Session 1 |
Wireshark |
cristel |
wireshark |
|
- wireshark lab |
cristel |
wireshark lab |
| Session 2 |
Cryptography Applications |
|
|
|
- VPNs, IPsec, TLS |
|
VPN IPsec TLS |
| Session 3 |
Cryptography Applications |
|
|
|
- ssh |
maz |
SSH |
|
- ssh lab |
maz |
VM configurations |
| Session 4 |
Cryptography Applications |
(if time allows) |
|
|
- l2tp/ipsec lab |
maz |
IPSEC VPN |
|
|
|
|
| Day 3 |
Topic |
Inst |
Presentations |
|
|
|
|
| Session 1 |
Network Infrastructure |
|
|
|
- overview |
cristel |
rtrs-switches |
|
- data plane |
cristel |
Filtering at border |
|
- Logging and Monitoring |
Bhumika |
Logging Monitoring |
| Session 2 |
anomaly and firewalls |
moin |
|
|
- anomaly |
|
3-2-1 anomaly |
|
- fierwalls |
|
3-2-2 firewalls |
| Session 3&4 |
BGP Route Filtering |
maz |
routing |
|
|
|
|
| Day 4 |
Topic |
Inst |
Presentations |
|
|
|
|
| Session 1 |
Securing Your Network |
Bhumika |
SecuringYourNetwork.pdf |
|
IDS |
moin |
|
|
- IDS pragmatics - snort |
|
4-2-1.snort |
|
- IDS pragmatics - snort-lab |
|
4-2-2.snort-lab | 4-2-3.snort_lab_answer |
| Session 2 |
Virus, Mail and Browsing |
|
|
|
- Anti-virus |
moin |
4-4-1 Anti-virus |
|
- Safe Mail Practices |
moin |
4-4-2 Safer Mail |
|
- Safe Browsing Practices |
Bhumika |
4-4-3 Safer browsing |
|
- File & Disk Encryption |
Bhumika |
4-4-4 File & Disk Encryption |
| Session 3 |
DNS & Application |
|
|
|
DNS lab |
maz |
lab-dns.pdf |
|
web server lab |
maz |
lab-www.pdf |
| Session 4 |
DNSSEC lab |
maz |
lab-dnssec.pdf |
|
|
|
|
| Day 5 |
Topic |
Inst |
Presentations |
|
|
|
|
| Session 1 |
DNSSEC lab 2 |
maz |
lab-dnssec-cont.pdf |
| Actual Session 1 |
Inter-Host Protocols |
|
|
|
- Covert Channels, TOR, Steganography |
cristel |
Covert Channels |
| Session 2 |
Scanning |
moin |
|
|
- nmap |
|
scanning |
| Session 3 |
Inter-Network Cooperation |
maz |
|
|
- Communities and Cooperation |
|
5-2-1 Security Communities |
| Session 4 |
Dessert |
All |
GroupPhoto |
|
|
|
|