Calendar and Venue

Date: Dec 8 to 12, 2019
Time: 09:00 – 17:00 NPT (GMT+0545)
Venue: Yala Durbar Venue, Shakhamul, Lalitpur

Workshop Details

Network Monitoring, Management and Automation


  • The objective of this workshop is to highlight the key concepts, protocols and the policies involved in establishing a suitable monitoring infrastructure  for Internet Service providers as well as enterprises. The workshop discusses the state-of-art technologies on automation as well as the best practices in order to realize the best network monitoring and management systems for all organizations of all types.

Target Audience

  • Engineers, Network Managers and Operators  who are interested in developing a perfect monitoring infrastructure for their organization.


  • It is assumed that participants have a basic understanding of network/system operations and Internet technologies.

Workshop topics

  • Network Monitoring and fundamentals
  • Automation Basics
  • Operational practices on building effiicient network monitoring Infrastructures
  • Network Operations Center concepts, including documenting your network and the use of network documentation systems such as Netdot
  • Nagios, Cacti, SmokePing and librenms network monitoring tools
  • Documentation – Ticketing systems (RT) and integration with other tools
  • Change Management – Change control including Subversion, RANCID and web tools NetFlow and NFSen
  • Log management and monitoring

Workshop Items

  • Agenda (includes links to presentations and schedule)

Chatur Shakya (PCH)
Dibya Khatiwada (PCH)
Srijan Bhuju (Worldlink)
Ritesh Adhikari (Workalaya)

Network Security


  • The objective of this workshop is to examine the elements involved in establishing and maintaining security for a network, and building an understanding and familiarity with the operations.
  • Device and network infrastructure security is also examined with a focus on establishing robust, stable, and secure networks.
  • It also includes an introductory level packet analysis for those who are performing incident response and investigation. Participants will explore tools such as wireshark, bro, tcpdump and others for dissecting network packets related to security incidents.
  • The workshop will also look at – Why BGP mishaps are very common and frighteningly very easy and explore current tools/techniques, and how route origin validation helps.

Target Audience

  • Engineers, Network Managers and Operators, and Security policy makers who are interested in network security and want to gain an understanding of the threats they face and how to mitigate such threats.


  • It is assumed that participants have a basic understanding of network operations, Internet technologies, OSI reference model and TCP/IP.

Workshop topics

  • Network security fundamentals
  • Vulnerabilities and Mitigation on different layers of the TCP/IP stack
  • Cryptography and PKI
  • Device and Infrastructure Security
  • Operational Security and Policies
  • Intrusion detection and prevention
  • Packet capture and analysis
  • Honeypots and honeynet
  • VPNs
  • Cryptomining/cyrptojacking
  • Resource PKI
  • Route Origin Validation

Other requirements

  • Participants are advised to bring their own laptop computers with high-speed Wi-Fi (802.11a/g/n/ac) and administrative access to system. It is also recommended that laptops have Intel i5 or i7 processor, >=8GB of RAM and 30GB of free hard disk space.

Workshop Items

  • Agenda (includes links to presentations and schedule)

Workshop Instructors
Tashi Phuntsho (APNIC)
Rupesh Basnet (Om Networks)
Bikash Bhattarai (Dristi Tech)

Certificate of Completion

Participants who successfully complete the 5-day workshops will be awarded a Certificate of Completion.

Terms and Conditions

For Workshops: All Tracks

  • All participants are expected to bring his/her own laptop for the workshop. The event organizers won’t be able to provide any laptops. The laptop should be able to connect to Workshop wireless network.
  • Basic knowledge of Computer Networks is required.
  • You agree to the event “Terms & Conditions” and are expected to observe fully the “Code of Conduct”.