Calendar and Venue
Date: Dec 8 to 12, 2019
Time: 09:00 – 17:00 NPT (GMT+0545)
Venue: Yala Durbar Venue, Shakhamul, Lalitpur
Workshop Details
Network Monitoring, Management and Automation
Synopsis
-
The objective of this workshop is to highlight the key concepts, protocols and the policies involved in establishing a suitable monitoring infrastructure for Internet Service providers as well as enterprises. The workshop discusses the state-of-art technologies on automation as well as the best practices in order to realize the best network monitoring and management systems for all organizations of all types.
Target Audience
-
Engineers, Network Managers and Operators who are interested in developing a perfect monitoring infrastructure for their organization.
Prerequisites
-
It is assumed that participants have a basic understanding of network/system operations and Internet technologies.
Workshop topics
-
Network Monitoring and fundamentals
-
Automation Basics
-
Operational practices on building effiicient network monitoring Infrastructures
- Network Operations Center concepts, including documenting your network and the use of network documentation systems such as Netdot
- Nagios, Cacti, SmokePing and librenms network monitoring tools
- Documentation – Ticketing systems (RT) and integration with other tools
- Change Management – Change control including Subversion, RANCID and web tools NetFlow and NFSen
- Log management and monitoring
Workshop Items
-
Agenda (includes links to presentations and schedule)
Instructors
Chatur Shakya (PCH)
Dibya Khatiwada (PCH)
Srijan Bhuju (Worldlink)
Ritesh Adhikari (Workalaya)
Network Security
Synopsis
-
The objective of this workshop is to examine the elements involved in establishing and maintaining security for a network, and building an understanding and familiarity with the operations.
-
Device and network infrastructure security is also examined with a focus on establishing robust, stable, and secure networks.
-
It also includes an introductory level packet analysis for those who are performing incident response and investigation. Participants will explore tools such as wireshark, bro, tcpdump and others for dissecting network packets related to security incidents.
-
The workshop will also look at – Why BGP mishaps are very common and frighteningly very easy and explore current tools/techniques, and how route origin validation helps.
Target Audience
-
Engineers, Network Managers and Operators, and Security policy makers who are interested in network security and want to gain an understanding of the threats they face and how to mitigate such threats.
Pre-requisites
-
It is assumed that participants have a basic understanding of network operations, Internet technologies, OSI reference model and TCP/IP.
Workshop topics
-
Network security fundamentals
-
Vulnerabilities and Mitigation on different layers of the TCP/IP stack
-
Cryptography and PKI
-
Device and Infrastructure Security
-
Operational Security and Policies
-
Intrusion detection and prevention
-
Packet capture and analysis
-
Honeypots and honeynet
-
VPNs
-
Cryptomining/cyrptojacking
-
Resource PKI
-
Route Origin Validation
Other requirements
-
Participants are advised to bring their own laptop computers with high-speed Wi-Fi (802.11a/g/n/ac) and administrative access to system. It is also recommended that laptops have Intel i5 or i7 processor, >=8GB of RAM and 30GB of free hard disk space.
Workshop Items
-
Agenda (includes links to presentations and schedule)
Workshop Instructors
Tashi Phuntsho (APNIC)
Rupesh Basnet (Om Networks)
Bikash Bhattarai (Dristi Tech)
Certificate of Completion
Participants who successfully complete the 5-day workshops will be awarded a Certificate of Completion.
Terms and Conditions
For Workshops: All Tracks
- All participants are expected to bring his/her own laptop for the workshop. The event organizers won’t be able to provide any laptops. The laptop should be able to connect to Workshop wireless network.
- Basic knowledge of Computer Networks is required.
- You agree to the event “Terms & Conditions” and are expected to observe fully the “Code of Conduct”.