{"id":37,"date":"2016-12-07T16:13:50","date_gmt":"2016-12-07T10:28:50","guid":{"rendered":"https:\/\/npnog.org.np\/npnog1-new\/?page_id=37"},"modified":"2018-12-18T02:40:44","modified_gmt":"2018-12-18T02:40:44","slug":"workshops","status":"publish","type":"page","link":"https:\/\/npnog.org.np\/npnog4\/programs\/workshops\/","title":{"rendered":"Workshops"},"content":{"rendered":"<h1>Calendar and Venue<\/h1>\n<p>Date: Dec 10 to 14, 2018<br \/>\nTime: 09:00 &#8211; 17:00 NPT (GMT+0545)<br \/>\nVenue: Hotel Yellow Pagoda<\/p>\n<h1>Workshop Details<\/h1>\n<h1><b>Network Management and Security<\/b><\/h1>\n<p><strong>Synopsis<\/strong><\/p>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\">The objective of this workshop is to examine the key concepts, protocols and the policies involved in establishing and maintaining security for a network, and building an understanding and familiarity with their operation. Device and network infrastructure security is examined with a focus on different layers to establish a robust, stable and secure network and protect the data and processes that occur in the network.<\/div>\n<\/li>\n<\/ul>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\">The workshop also looks at the nature and structure of network attacks and the motivation that drives such on-line malicious activity.<\/div>\n<\/li>\n<\/ul>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\">The course further examines the actions and processes that can be used to identify, mitigate and respond to such attacks.<\/div>\n<\/li>\n<\/ul>\n<p><strong>Target Audience<\/strong><\/p>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\">Engineers, Network Managers and Operators, and Security policy makers who are interested in network security and want to gain an understanding of the threats they face and how to mitigate such threats.<\/div>\n<\/li>\n<\/ul>\n<p><strong>Prerequisites<\/strong><\/p>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\">It is assumed that participants have a basic understanding of network operations and Internet technologies.<\/div>\n<\/li>\n<\/ul>\n<p><strong>Workshop topics<\/strong><\/p>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\">Network security fundamentals<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Security on Different Layers and Attack Mitigation<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Cryptography and PKI<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Device and Infrastructure Security<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Operational Security and Policies<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Virtual Private Networks and IPsec<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">IPv6 Security<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Route Filtering<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">DNSSEC<\/div>\n<\/li>\n<\/ul>\n<p><strong>Workshop Items<\/strong><\/p>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\"><a class=\"wikilink1\" title=\"netsec20181209-np:agenda\" href=\"https:\/\/wiki.apnictraining.net\/netsec20181209-np\/agenda\">Agenda<\/a>\u00a0(includes links to presentations and schedule)<\/div>\n<\/li>\n<\/ul>\n<p><strong style=\"font-size: 1rem\">Instructors<\/strong><br \/>\n<strong>Muhammad Moinur Rahman (APNIC)<\/strong><br \/>\n<strong>Chatur Shakya (PCH)<br \/>\n<\/strong><strong>Rupesh Basnet (OM Networks)<\/strong><\/p>\n<hr \/>\n<h2>IPv6 Deployment workshop<\/h2>\n<p><b>Synopsis<\/b><br \/>\nThis technical workshop is made up of lectures and hands-on lab exercise to teach the concept of IPv6 protocol architecture, its addressing structure, design issues when planning for IPv6 deployment focusing on IP core network. It discusses network infrastructure design principles for dual stack deployment, OSPFv3, MP-BGP, transition technologies etc. Also presented for understanding and to encourage best practice knowledge.<br \/>\nThe course includes considerable practical work based on IPv6 and Cisco IOS router configuration commands.<br \/>\n<b>Target Audience<\/b><br \/>\nBoth Entry and\/or mid level technical staff of ISP, network operators or enterprise, who are involved in day-to-day network operation and planning function.<br \/>\n<b>Pre-requisites<\/b><br \/>\nIt is assumed that participants have a basic understanding of network operations, Internet technologies, OSI reference model, TCP\/IP and familiar with router operating system software (i.e Cisco IOS etc).<br \/>\n<b>Workshop topics<\/b><\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Internet Fundamentals<\/li>\n<li>Routing Protocols &#8211; IS-IS and BGP<\/li>\n<li>IPv6 Protocol and Standards<\/li>\n<li>IPv6 Enhancements to Internet Routing Protocols<\/li>\n<li>IPv6 addressing and Building IPv6 Address Plans<\/li>\n<li>Securing and Hardening IPv6 Networks and Devices<\/li>\n<li>IPv6 transition technologies including dual stack, 6rd, DS-Lite, 464XLAT, NAT64<\/li>\n<li>IPv6 deployment case study<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong style=\"font-size: 1rem\">Instructors<\/strong><br \/>\n<b>Ram Krishna Pariyar (Subisu)<br \/>\nKabindra Shrestha (PCH)<br \/>\nVivek V Padale (Juniper)<br \/>\n<\/b><b>Kijush Maharjan (Worldlink)<\/b><\/p>\n<p>Workshop Items<\/p>\n<ul>\n<li><a href=\"https:\/\/npnog.org.np\/npnog4\/v6-agendas\/\">Agenda<\/a>\u00a0(includes links to presentations and schedule)<\/li>\n<\/ul>\n<hr \/>\n<h1><b>FTTH<\/b><\/h1>\n<p>Date: Dec 10 to 12, 2018<\/p>\n<p><b>Workshop Topics<\/b><\/p>\n<ul>\n<li>Fiber Concept<\/li>\n<li>What is FTTH ?\n<ul>\n<li>Why FTTH ?<\/li>\n<\/ul>\n<\/li>\n<li>Broadband Providers\n<ul>\n<li>Broadband options\n<ul>\n<li>Why FTTH ? Why Now<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>FTTH Architectures\n<ul>\n<li>Components\n<ul>\n<li>Installation Techniques<\/li>\n<li>Network Design<\/li>\n<li>Power Calculation<\/li>\n<li>Troubleshoot in FTTH<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>GPON Introduction\n<ul>\n<li>What is GPON<\/li>\n<li>Evolution and Future<\/li>\n<\/ul>\n<\/li>\n<li>OLT &amp; ONT \/ ONU Definition\n<ul>\n<li>Service Definition<\/li>\n<li>OLT Description<\/li>\n<li>ONT Creation<\/li>\n<\/ul>\n<\/li>\n<li>Operations &amp; EMS\n<ul>\n<li>Service QoS<\/li>\n<li>End User Experience<\/li>\n<li>Control via EMS<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Instructors<br \/>\nShri Ankur Sharma (Nokia)<\/strong><br \/>\n<b>Kiran Devkota (Worldlink)<br \/>\nGyanendra Maharjan (InSyst Pvt. Ltd)<br \/>\nKrishna Murari Poudel (Worldlink)<br \/>\nRaju Chalise (Worldlink)<\/b><\/p>\n<hr \/>\n<h1><b>WiFi Management and Security<\/b><\/h1>\n<p>Date: Dec 13 to 14, 2018<\/p>\n<p><b>Workshop Topics<\/b><\/p>\n<p>Introduction to WiFi Networks (120 mins)<\/p>\n<ul>\n<li>802.11 Standards Family<\/li>\n<li>Building blocks of WiFi technology (Spectrum Reuse, Carrier Sensing, Modulation, Bandwidth Aggregation, MIMO, Roaming, QoS, VoWiFi)<\/li>\n<li>802.11ax Overview<\/li>\n<\/ul>\n<p>End-to-End WiFi Network Architecture (120 mins)<\/p>\n<ul>\n<li>Core Network ( AAA, Captive portal, WAG)<\/li>\n<li>Wireless Authentication Models and Mechanisms<\/li>\n<li>Enterprise, Public, Telco Call Flow<\/li>\n<\/ul>\n<p>WIPS and WIDS (30 mins)<\/p>\n<p><strong>Lab Session 1:<\/strong><\/p>\n<ul>\n<li>General Configuration of Wi-Fi network<\/li>\n<li>Spectrum Analysis<\/li>\n<li>Demo of Security Threats and Detection<\/li>\n<\/ul>\n<p>WiFi Network Design &amp; Planning (30 mins)<\/p>\n<p>Troubleshooting &amp; Optimization<\/p>\n<p>RFP Design<\/p>\n<p><strong>Lab\u00a0 Session 2:<\/strong><\/p>\n<ul>\n<li>Demo for Advanced features and their working principle<\/li>\n<\/ul>\n<p><strong style=\"font-size: 1rem\">Instructors<\/strong><\/p>\n<p><b>Punit Manandhar (Worldlink)<br \/>\nAshish Nehte (Arista)<br \/>\nNadeem Akhtar (Arista)<br \/>\nDibya Khatiwada (PCH)<\/b><\/p>\n<p><a href=\"https:\/\/npnog.org.np\/npnog4\/wp-content\/uploads\/2018\/10\/WiFi_Workshop.zip\">Workshop Slides<\/a><\/p>\n<hr \/>\n<h3>Certificate of Completion<\/h3>\n<p>Participants who successfully complete the 5-day workshops will be awarded a Certificate of Completion.<\/p>\n<hr \/>\n<h3><strong>Terms and Conditions<\/strong><\/h3>\n<p>For Workshops: All Tracks<\/p>\n<ul>\n<li>All participants are expected to bring his\/her own laptop for the workshop. The event organizers won&#8217;t be able to provide any laptops. The laptop should be able to connect to Workshop wireless network.<\/li>\n<li>Basic knowledge of Computer Networks is required.<\/li>\n<li>You agree to the event &#8220;Terms &amp; Conditions&#8221; and are expected to observe fully the &#8220;Code of Conduct&#8221;.<\/li>\n<\/ul>\n<div class=\"grammarly-disable-indicator\"><\/div>\n<div class=\"grammarly-disable-indicator\"><\/div>\n<div class=\"grammarly-disable-indicator\"><\/div>\n<div class=\"grammarly-disable-indicator\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Calendar and Venue Date: Dec 10 to 14, 2018 Time: 09:00 &#8211; 17:00 NPT (GMT+0545) Venue: Hotel Yellow Pagoda Workshop Details Network Management and Security Synopsis The objective of this workshop is to examine the key concepts, protocols and the policies involved in establishing and maintaining security for a network, and building an understanding and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":7,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/npnog.org.np\/npnog4\/wp-json\/wp\/v2\/pages\/37"}],"collection":[{"href":"https:\/\/npnog.org.np\/npnog4\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/npnog.org.np\/npnog4\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/npnog.org.np\/npnog4\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/npnog.org.np\/npnog4\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":37,"href":"https:\/\/npnog.org.np\/npnog4\/wp-json\/wp\/v2\/pages\/37\/revisions"}],"predecessor-version":[{"id":912,"href":"https:\/\/npnog.org.np\/npnog4\/wp-json\/wp\/v2\/pages\/37\/revisions\/912"}],"up":[{"embeddable":true,"href":"https:\/\/npnog.org.np\/npnog4\/wp-json\/wp\/v2\/pages\/7"}],"wp:attachment":[{"href":"https:\/\/npnog.org.np\/npnog4\/wp-json\/wp\/v2\/media?parent=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}