Introduction to Secure Registry Operations

Date: Jan 2016

Venue: SANOG 27/Kathmandu

Instructors: Champika Wijayatunga and Rick Lamb

Agenda:
TimeTopicLink
Welcome & Introduction pdf
Introduction to Course Architecture pdf
> Exercise: SSH keys txt
Secure Operations Overview pdf
Update: An Incident Response Checklist pdf
> Exercise: acct txt
Cyber Attack Scenario Overview pdf
Reconnaissance and Enumeration pdf
> Exercise: Port Scanning txt
Log Management pdf
> Exercise: Log Management with SWATCH txt
> Exercise: Centralized Logging txt
> Exercise: Detecting Router Configuration Changes txt
Breaking In pdf
> Exercise: Brute Force SSH Attack txt
> Exercise: Secure SSH Configuration txt
Zone Transfer -
> Exercise: Zone Transfer Monitoring txt
> Exercise: Zone Transfer Mitigation txt
Cacti pdf
SNMP pdf
> Exercise: Cacti txt
NAGIOS Monitoring Framework pdf
> Exercise: NAGIOS Configuration txt
Disruption pdf
Smokeping pdf
Netflow pdf
Nfsen pdf
> Exercise: NFSen & NetFlow txt
Nfsen Example pdf
Mitigation Strategies pdf
End of Course Wrap-up, Critique, Certificates -