{"id":37,"date":"2016-12-07T16:13:50","date_gmt":"2016-12-07T10:28:50","guid":{"rendered":"https:\/\/npnog.org.np\/npnog1-new\/?page_id=37"},"modified":"2023-06-26T17:42:20","modified_gmt":"2023-06-26T11:57:20","slug":"workshops","status":"publish","type":"page","link":"https:\/\/npnog.org.np\/npnog8\/programs\/workshops\/","title":{"rendered":"Workshops"},"content":{"rendered":"<h1>Calendar and Venue<\/h1>\n<p>Date: June 18 to 22, 2023<br \/>\nTime: 09:30 &#8211; 17:30 NPT (GMT+0545)<br \/>\nVenue: Hotel Royal Singhi, Durbarmarg, Kathmandu<\/p>\n<h1>Workshop Details<\/h1>\n<h1><strong>1. Network Security<br \/>\n<\/strong><\/h1>\n<p><strong>Trainers:<\/strong><\/p>\n<ul>\n<li>Warren Finch (APNIC)<\/li>\n<li>Swapneel Patnekar (APNIC Community Trainer)<\/li>\n<li>Rupesh Basnet (OM Networks)<\/li>\n<li>Pratik Regmi (MBL)<\/li>\n<\/ul>\n<p><strong>Synopsis<\/strong><\/p>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\">Security is a broad topic that affects many aspects relating to end-users, applications, and infrastructure. The objective of this workshop is to examine key concepts, protocols, policies, and practices to protect data and assets from potential attacks or abuse. This workshop will cover network infrastructure security with a focus on establishing robust, stable networks with secure routing. This workshop also focuses on security operations and frameworks, while also examining common security incidents\/breaches and discuss countermeasures and mitigation tools.<\/div>\n<\/li>\n<\/ul>\n<p><strong>Target Audience<\/strong><\/p>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\">This course is targeted to network managers and operators, engineers and policy makers who are interested in network security and want to gain an understanding of security operations. The topics covered range from basic to intermediate level that aims to educate and challenge participants.<\/div>\n<\/li>\n<\/ul>\n<p><strong>Pre-requisites<\/strong><\/p>\n<p>It is assumed that participants have a basic understanding of:<\/p>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\">network operations, Internet technologies, OSI reference model and TCP\/IP.<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Basic command line (CLI) skills.<\/div>\n<\/li>\n<\/ul>\n<p>We recommend the following Academy courses be completed before the start of the tutorial:<\/p>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\">Network security fundamentals: <a class=\"urlextern\" title=\"https:\/\/academy.apnic.net\/en\/webinar-courses\/network-security-fundamentals\/\" href=\"https:\/\/academy.apnic.net\/en\/webinar-courses\/network-security-fundamentals\/\" target=\"_blank\" rel=\"ugc nofollow noopener\">https:\/\/academy.apnic.net\/en\/webinar-courses\/network-security-fundamentals\/<\/a><\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Introduction to Cybersecurity: <a class=\"urlextern\" title=\"https:\/\/academy.apnic.net\/en\/course\/introduction-to-cybersecurity\/\" href=\"https:\/\/academy.apnic.net\/en\/course\/introduction-to-cybersecurity\/\" target=\"_blank\" rel=\"ugc nofollow noopener\">https:\/\/academy.apnic.net\/en\/course\/introduction-to-cybersecurity\/<\/a><\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Linux Virtual Lab: <a class=\"urlextern\" title=\"https:\/\/academy.apnic.net\/en\/virtual-labs?labId=87395\" href=\"https:\/\/academy.apnic.net\/en\/virtual-labs?labId=87395\" target=\"_blank\" rel=\"ugc nofollow noopener\">https:\/\/academy.apnic.net\/en\/virtual-labs?labId=87395<\/a><\/div>\n<\/li>\n<\/ul>\n<p><strong>Course Outline:<\/strong><\/p>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\">Network Security Fundamentals<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Packet Analysis<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Device &amp; Infrastructure Security<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Security Operations &amp; Monitoring<\/div>\n<\/li>\n<\/ul>\n<p><strong>Other requirements<\/strong><\/p>\n<ul class=\" fix-media-list-overlap\">\n<li class=\"level1\">\n<div class=\"li\"><strong>Face to face<\/strong> &#8211; Participants are advised to bring their own laptop computers with high-speed Wi-Fi (802.11a\/g\/n\/ac) and administrative access to system. It is also recommended that laptops have Intel i5 or i7 processor, &gt;=8GB of RAM and 30GB of free hard disk space.<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Software: SSH Client, Telnet Client, VirtualBox\/VMware<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Confirm Secure SHell (SSH) is allowed from the office or home network to access the lab infrastructure. Test ssh connectivity, try to connect to route-views.routeviews.org. For example from the CLI type: ssh rviews@route-views.routeviews.org<\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Attendees must have an APNIC Academy login account. If you don&#8217;t have one already, you can create an account for free at <a class=\"urlextern\" title=\"https:\/\/academy.apnic.net\/\" href=\"https:\/\/academy.apnic.net\/\" target=\"_blank\" rel=\"ugc nofollow noopener\">https:\/\/academy.apnic.net\/<\/a><\/div>\n<\/li>\n<li class=\"level1\">\n<div class=\"li\">Please test the speed of your Internet connection to the servers where the Virtual Machines (VMs) are hosted at the Learn on Demand data centres, using the speed test tool at <a class=\"urlextern\" title=\"https:\/\/www.learnondemandsystems.com\/speedtest\/\" href=\"https:\/\/www.learnondemandsystems.com\/speedtest\/\" target=\"_blank\" rel=\"ugc nofollow noopener\">https:\/\/www.learnondemandsystems.com\/speedtest\/<\/a><\/div>\n<\/li>\n<\/ul>\n<h1><a href=\"https:\/\/academy.apnic.net\/en\/events?id=a0B2e000000djfNEAQ\">Course Materials<\/a><\/h1>\n<h1><strong>2. Optical Network Infrastructure<\/strong><\/h1>\n<p><strong>Trainers:<\/strong><\/p>\n<ul>\n<li>Hari K Bhandari (Worldlink Communications Ltd.)<\/li>\n<li>Bikash Shrestha (Worldlink Communications Ltd.)<\/li>\n<li>Indra Raj Basnet (Subisu)<\/li>\n<li>Milan Gyawali (Worldlink Communications Ltd.)<\/li>\n<li>Kamlesh Yadav (Worldlink Communications Ltd.)<\/li>\n<\/ul>\n<p><strong>Course Outline:<\/strong><\/p>\n<p>Day 1<\/p>\n<ul>\n<li>Fiber Optics Concepts, Fiber types and Series,<\/li>\n<li><span style=\"font-size: revert;\">Color codes, tube,<\/span>\u00a0 <span style=\"font-size: revert;\">Patch cord with color codes,Type of Different fiber connectors<\/span><\/li>\n<li><span style=\"font-size: revert;\">Labs = IL and RL test and end face quality check<\/span><\/li>\n<li><span style=\"font-size: revert;\">Q n A<\/span><\/li>\n<\/ul>\n<p>Day 2<\/p>\n<ul>\n<li>Optical Distribution Network<\/li>\n<li><span style=\"font-size: revert;\">AON and PON Network Design<\/span><\/li>\n<li><span style=\"font-size: revert;\">Link Budget Calculation<\/span><\/li>\n<li><span style=\"font-size: revert;\">Components of Networks<\/span><\/li>\n<li><span style=\"font-size: revert;\">Q n A<\/span><\/li>\n<\/ul>\n<p>Day 3<\/p>\n<ul>\n<li>Splicing process (How Splicing machine works demo)<\/li>\n<li><span style=\"font-size: revert;\">Fiber Tools= OTDR<\/span><\/li>\n<li><span style=\"font-size: revert;\">Power meter, optical identifier, laser light<\/span><\/li>\n<li><span style=\"font-size: revert;\">Fiber Cleaner<\/span><\/li>\n<li><span style=\"font-size: revert;\">Q n A<\/span><\/li>\n<\/ul>\n<p>Day 4<\/p>\n<ul>\n<li>Fiber optics Concept<\/li>\n<li><span style=\"font-size: revert;\">FTTH overview<\/span><\/li>\n<li><span style=\"font-size: revert;\">Why FTTH?<\/span><\/li>\n<li><span style=\"font-size: revert;\">FTTH Architecture &amp; Components<\/span><\/li>\n<li><span style=\"font-size: revert;\">GPON introduction &amp; Why ?<\/span><\/li>\n<li><span style=\"font-size: revert;\">Broadband providers &amp; Options<\/span><\/li>\n<li><span style=\"font-size: revert;\">Evolution and Future<\/span><\/li>\n<li><span style=\"font-size: revert;\">Operations and EMS<\/span><\/li>\n<li><span style=\"font-size: revert;\">Services QoS<\/span><\/li>\n<li><span style=\"font-size: revert;\">Vendor based QoS implementation<\/span><\/li>\n<li><span style=\"font-size: revert;\">Control Via EMS<\/span><\/li>\n<li><span style=\"font-size: revert;\">Vendors Based Nomenclature (Huawei and Nokia)<\/span><\/li>\n<\/ul>\n<p>Day 5<\/p>\n<ul>\n<li>DWDM Overview\n<ul>\n<li>WDM Concept<\/li>\n<li><span style=\"font-size: 1rem;\">Optical region<\/span><\/li>\n<li><span style=\"font-size: 1rem;\">CWDM vs DWDM<\/span><\/li>\n<li><span style=\"font-size: 1rem;\">DWDM System components &amp; Integration<\/span><\/li>\n<li><span style=\"font-size: 1rem;\">DWDM Key technologies (OTN, FOADM, ROADM, ASON)<\/span><\/li>\n<li><span style=\"font-size: 1rem;\">DWDM Networking design<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h1>Course Materials<\/h1>\n<ul>\n<li>Optical Network<\/li>\n<li>FTTH<\/li>\n<li>DWDM<\/li>\n<\/ul>\n<h1><strong>3. BGP and IPv6 Deployment<\/strong><\/h1>\n<p><strong>Trainers<\/strong><\/p>\n<ul>\n<li>Imtiaz Sajid (APNIC)<\/li>\n<li>Subhashini Kadurugasyaya (APNIC Community Trainer)<\/li>\n<li>Rupesh K. Thapa (Thakral One)<\/li>\n<li>Dibya Khatiwada (PCH)<\/li>\n<\/ul>\n<h3 class=\"sc-giAqHp kozIKz\">Synopsis<\/h3>\n<p>This technical workshop, made up of lectures and hands-on lab modules, is targeted at anyone who is involved in Internet technology standards, local and national network infrastructure deployment and day to day network operations.<\/p>\n<p>This hands-on workshop will look at fundamentals of Internet routing, BGP Fundamentals, BGP scaling, and industry best current practices.<\/p>\n<p>The workshop will also help the participants have a better understanding of the IPv6 protocol and learn how to deploy IPv6 in their network.<\/p>\n<h3 class=\"sc-giAqHp kozIKz\">Target audience<\/h3>\n<p class=\"sc-hkoqWr jwZvNA\">Technical staff who are involved in Internet technology standards, local and national network infrastructure planning &amp; deployment, and day-to-day network operations<\/p>\n<h3 class=\"sc-giAqHp kozIKz\">Pre-requisites<\/h3>\n<p>It is assumed that the workshop participants:<\/p>\n<ul>\n<li>have a working knowledge of IP Routing, and<\/li>\n<li>are comfortable with basic linux commands and how to use a router command line interface.<\/li>\n<li>This workshop is not an introduction. The lab exercises use Cisco IOS configuration syntax.<\/li>\n<\/ul>\n<p>We recommend the following Academy courses be completed before the start of the tutorial:<\/p>\n<ul>\n<li>Routing Fundamentals:\u00a0<a href=\"https:\/\/academy.apnic.net\/en\/course\/routing-fundamentals-course\/\" target=\"_blank\" rel=\"noopener\">https:\/\/academy.apnic.net\/en\/course\/routing-fundamentals-course\/<\/a><\/li>\n<li>IPv6 Fundamentals &#8211;\u00a0<a href=\"https:\/\/academy.apnic.net\/en\/course\/ipv6-fundamentals\/\" target=\"_blank\" rel=\"noopener\">https:\/\/academy.apnic.net\/en\/course\/ipv6-fundamentals\/<\/a><\/li>\n<\/ul>\n<h3 class=\"sc-giAqHp kozIKz\">Course outline<\/h3>\n<ul>\n<li>BGP Fundamentals<\/li>\n<li>BGP Scaling techniques<\/li>\n<li>BGP Attributes and Policy Control<\/li>\n<li>BGP Operations and Security Best Current Practices<\/li>\n<li>IPv6 Protocol architecture and standards<\/li>\n<li>IPv6 Enhancements to Routing Protocols<\/li>\n<li>IPv6 addressing and address planning<\/li>\n<li>IPv6 transition technologies<\/li>\n<li>IPv6 deployment planning<\/li>\n<li>IPv6 end user deployment<\/li>\n<li>IPv6 security<\/li>\n<\/ul>\n<h3 class=\"sc-giAqHp kozIKz\">Other requirements<\/h3>\n<ul>\n<li><strong>Face to face<\/strong>\u00a0&#8211; Participants are advised to bring their own laptop computers with high-speed Wi-Fi (802.11a\/g\/n\/ac) and administrative access to system. It is also recommended that laptops have Intel i5 or i7 processor, &gt;=8GB of RAM and 30GB of free hard disk space.<\/li>\n<li>Software: SSH Client, Telnet Client, VirtualBox\/VMware<\/li>\n<li>Confirm Secure SHell (SSH) is allowed from the office or home network to access the lab infrastructure? Test ssh connectivity, try to connect to\u00a0<a href=\"http:\/\/route-views.routeviews.org\/\" target=\"_blank\" rel=\"noopener\">route-views.routeviews.org<\/a>. For example from the CLI type: ssh\u00a0<a href=\"mailto:rviews@route-views.routeviews.org\" target=\"_blank\" rel=\"noopener\">rviews@route-views.routeviews.org<\/a><\/li>\n<li>Attendees must have an APNIC Academy login account. If you don&#8217;t have one already, you can create an account for free at\u00a0<a href=\"https:\/\/academy.apnic.net\/\" target=\"_blank\" rel=\"noopener\">https:\/\/academy.apnic.net\/<\/a><\/li>\n<li>Please test the speed of your Internet connection to the servers where the Virtual Machines (VMs) are hosted at the Learn on Demand data centres, using the speed test tool at\u00a0<a href=\"https:\/\/www.learnondemandsystems.com\/speedtest\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.learnondemandsystems.com\/speedtest\/<\/a><\/li>\n<\/ul>\n<h1><a href=\"https:\/\/academy.apnic.net\/en\/events?id=a0B2e000000djeZEAQ\">Course Materials<\/a><\/h1>\n","protected":false},"excerpt":{"rendered":"<p>Calendar and Venue Date: June 18 to 22, 2023 Time: 09:30 &#8211; 17:30 NPT (GMT+0545) Venue: Hotel Royal Singhi, Durbarmarg, Kathmandu Workshop Details 1. Network Security Trainers: Warren Finch (APNIC) Swapneel Patnekar (APNIC Community Trainer) Rupesh Basnet (OM Networks) Pratik Regmi (MBL) Synopsis Security is a broad topic that affects many aspects relating to end-users, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":7,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/npnog.org.np\/npnog8\/wp-json\/wp\/v2\/pages\/37"}],"collection":[{"href":"https:\/\/npnog.org.np\/npnog8\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/npnog.org.np\/npnog8\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/npnog.org.np\/npnog8\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/npnog.org.np\/npnog8\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":74,"href":"https:\/\/npnog.org.np\/npnog8\/wp-json\/wp\/v2\/pages\/37\/revisions"}],"predecessor-version":[{"id":1537,"href":"https:\/\/npnog.org.np\/npnog8\/wp-json\/wp\/v2\/pages\/37\/revisions\/1537"}],"up":[{"embeddable":true,"href":"https:\/\/npnog.org.np\/npnog8\/wp-json\/wp\/v2\/pages\/7"}],"wp:attachment":[{"href":"https:\/\/npnog.org.np\/npnog8\/wp-json\/wp\/v2\/media?parent=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}