<?xml version="1.0" encoding="utf-8"?>
<!-- generator="Joomla! - Open Source Content Management" -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>AFRINIC-19 - Agenda</title>
		<description><![CDATA[]]></description>
		<link>https://meeting.afrinic.net/afrinic-19/en/agenda/36-training</link>
		<lastBuildDate>Wed, 25 Jul 2018 10:33:38 +0000</lastBuildDate>
		<generator>Joomla! - Open Source Content Management</generator>
		<atom:link rel="self" type="application/rss+xml" href="https://meeting.afrinic.net/afrinic-19/en/agenda/36-training?format=feed&amp;type=rss"/>
		<language>en-gb</language>
		<item>
			<title>DNNSEC</title>
			<link>https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/142-dnnsec</link>
			<guid isPermaLink="true">https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/142-dnnsec</guid>
			<description><![CDATA[<div class="feed-description"><p><strong>Target Audience</strong></p>
<p>Operators interested in deploying DNS Security as part of their security infrastructure and people with a general interest in DNSSEC, and those contemplating whether or not to deploy DNSSEC in their organisation.</p>
<p><br /><strong>Pre-requisites</strong></p>
<p>Basic DNS, Public key encryption and basic knowledge about UNIX System Administration</p>
<p><br /><strong>Course Outline</strong></p>
<p>This tutorial covers the following topics:</p>
<p>• Introduction/Review of DNSSEC<br />• Securing zone transfer (TSIG)<br />• Securing a zone<br />• Configuring a security-aware resolver<br />• Delegation of signing authority<br />• Rolling keys<br />• Troubleshooting<br />• DPS<br />• DNSSEC deployment plan<br />• OpenDNSSEC</p>
<p><strong>Technologies Covered</strong></p>
<p>DNS, TSIG, DNSSEC including NSEC3</p></div>]]></description>
			<author>ashil@afrinic.net (ashil)</author>
			<category>Training</category>
			<pubDate>Thu, 10 Oct 2013 06:27:17 +0000</pubDate>
		</item>
		<item>
			<title>AfricaCERT Day</title>
			<link>https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/141-africacert-day</link>
			<guid isPermaLink="true">https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/141-africacert-day</guid>
			<description><![CDATA[<div class="feed-description"><p>AfricaCERT meetings provide a forum for collaboration and exchange for Computer Emergency response Teams and interested parties to sharing common practices, information, tools, techniques, and strategies that address problems related to cyber-security.</p>
<p>AfricaCERT Day builds on the experience from previous AfricaCERT events held in different African countries in collaboration with AfNOG and AFRINIC.</p>
<p>AfricaCERT V Day follows three days of Intensive training in collaboration with FIRST and JPCERT.&nbsp;</p>
<p>AfricaCERT V theme is “Our Role in the African Internet Ecosystem”.</p></div>]]></description>
			<author>ashil@afrinic.net (ashil)</author>
			<category>Training</category>
			<pubDate>Thu, 10 Oct 2013 06:22:56 +0000</pubDate>
		</item>
		<item>
			<title>JPCERT</title>
			<link>https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/140-jpcert</link>
			<guid isPermaLink="true">https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/140-jpcert</guid>
			<description><![CDATA[<div class="feed-description"><p>Le programme CSIRT s'adresse aux équipes techniques pour la surveillance avancée des réseaux.</p>
<p><strong>Description</strong></p>
<p>Un atelier d’une journée, axé sur la sécurisation avancée du web.</p>
<p><strong>Cours</strong></p>
<p>Surveillance des réseaux et analyse du trafic (niveau supérieur)</p>
<p><strong>Résumé</strong></p>
<p>La surveillance des réseaux est un moyen parmi d’autres pour comprendre ce qui se passe sur un réseau. Cette session a pour objet les connaissances de base que nous devons avoir concernant la surveillance des réseaux et leurs problèmes (exemple : problèmes légaux, vie privée, chiffrage, réseaux cachés, etc.). Le cours de formation offre des sessions pratiques aux participants pour les analyses du trafic généré par malware, botnet et d’autres outils malveillants.</p></div>]]></description>
			<author>ashil@afrinic.net (ashil)</author>
			<category>Training</category>
			<pubDate>Thu, 10 Oct 2013 06:20:09 +0000</pubDate>
		</item>
		<item>
			<title>CSIRT Training</title>
			<link>https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/139-csirt-training</link>
			<guid isPermaLink="true">https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/139-csirt-training</guid>
			<description><![CDATA[<div class="feed-description"><p><strong>Introduction</strong>&nbsp;</p>
<p>The Computer Security Incident Response Team (CSIRT) training course aims to develop the knowledge and skills of staff members of a CSIRT or those interested in joining such a team, or involved in creating such a team.</p>
<p>&nbsp;</p>
<p><strong>Pre-requisites</strong><del cite="mailto:Julie%20Auverdin" datetime="2013-10-04T16:29"><br /></del></p>
<p>Trainees are typically experienced system, network or IT managers (Interested persons from other backgrounds are welcome to contact the organisers to discuss the suitability of the course for them). They are expected to have an awareness of the security issues involved in connecting computers to the Internet. They must be committed to using their skills to improve the security of computers and networks. For the technical side of the course, familiarity with the normal operation of TCP/IP networks, addresses, port numbers and protocols will be assumed.</p>
<p>The following modules are covered:&nbsp;</p>
<p><strong>CSIRT Organization</strong></p>
<p>Describes how CSIRTs fit into their organisations: planning the CSIRT, defining the constituency of the team and gaining management authority for it, deciding the services the team will offer, working with those outside the organisation, staffing the CSIRT, funding. Participants will discuss their own organisation and how their team fits into it.</p>
<p>&nbsp;</p>
<p><strong>Technical Introduction</strong></p>
<p>A basic introduction to the main attack vectors that malicious parties use to attack systems: intruders and their motivations, botnets, network protocols and how they can be abused, operating systems and services, types of vulnerability, information gathering, breaking in, hiding traces, denial-of-service attacks.</p>
<p>&nbsp;</p>
<p><strong>CSIRT Operations</strong></p>
<p>Describes the facilities, systems and tools needed by CSIRTs to operate successfully: housing the CSIRT, equipment, e-mail, remote access, information and contacts, servers and networks, incident response plans and procedures, tracking systems. As an exercise participants will discuss and develop incident response plans for their own teams.</p>
<p>&nbsp;</p>
<p><strong>Legal Issues</strong></p>
<p>&nbsp;A high level overview of the areas of legislation that are likely to affect CSIRTs in their work and that team members need to be aware of: origins of computer legislation, problems, data protection, computer misuse, working with law enforcement, monitoring, evidence, European developments.</p></div>]]></description>
			<author>ashil@afrinic.net (ashil)</author>
			<category>Training</category>
			<pubDate>Thu, 10 Oct 2013 06:12:43 +0000</pubDate>
		</item>
		<item>
			<title>IPv6 for Engineers</title>
			<link>https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/138-ipv6-for-engineers</link>
			<guid isPermaLink="true">https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/138-ipv6-for-engineers</guid>
			<description><![CDATA[<div class="feed-description"><p>This is the keystone foundation module for all our technical workshops. It gives the participants a solid understanding of IPv6's core concepts and is required for understanding all other IPv6 topics. On completion of this module you will be able to:</p>
<p>• Identify, write and shorten IPv6 addresses<br />• List the types of IPv6 addresses and their unique characteristics<br />• Create an IPv6 address plan for a network<br />• Identify and list the equivalent IPv4 key protocols in IPv6<br />• Describe how NDP is used to deliver key IPv6 functions<br />• Configure and verify basic IPv6 on hosts and routers</p>
<p><strong>Target Audience</strong><br />• Network engineers and architects<br />• Network technicians and support staff <br /> <br /><strong>Pre-requisites</strong><br />• IPv4 Addressing and subnetting.<br />• The OSI model and the various protocols that operate at each layer.<br />• Intra-domain routing and OSPF.<br />• How to use the command line interfaces of key routing platforms (e.g Cisco IOS)<br /> <br /><strong>Module outline</strong><br />• IPv4 address exhaustion - review, implications and consequences<br />• IPv6 address basics - notation and representation<br />• IPv6 addressing types<br />• IPv6 address planning<br />• IPv6 from an IPv4 perspective<br />• Understanding ND and key IPv6 mechanisms<br />• IPv6 address provisioning<br />o Stateless Automatic Address Configuration (SLAAC)<br />o Dynamic Host Configuration Protocol (DHCPv6)<br />• Basic IPv6 address configuration and verification on equipment<br />• Labs/Exercises<br />o Planning IPv6 address pace for a given network<br />o Configuring and verifying IPv6 on hosts (Windows, Mac OS X, Linux/Unix)<br />• Static Configuration<br />• Automatic Configuration<br />o Configuring and verifying IPv6 on routers<br />o Verifying IPv6 functioning using network packet captures (tcpdump, tshark etc)</p>
<p>More information on this workshop is available on the AFRINIC Training website.</p>
<p>&nbsp;</p></div>]]></description>
			<author>ashil@afrinic.net (ashil)</author>
			<category>Training</category>
			<pubDate>Thu, 10 Oct 2013 06:05:36 +0000</pubDate>
		</item>
		<item>
			<title>IPv6 for Managers</title>
			<link>https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/137-ipv6-for-managers</link>
			<guid isPermaLink="true">https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/137-ipv6-for-managers</guid>
			<description><![CDATA[<div class="feed-description"><p>This module aims to close the knowledge gap and give advice to business executives on how to evaluate IPv6 strategically as well as providing support to those deploying IPv6.<br /> <br /><strong>Target audience</strong></p>
<p><br />• Executives and managers<br />• Government regulators&nbsp;<br />• IT advisors to government officials</p>
<p><br /><strong>Pre-requisites</strong></p>
<p><br />• An open mind<br />• A willingness to keep your organisation technologically relevant</p>
<p>More information on this workshop is available on the AFRINIC Training website</p></div>]]></description>
			<author>ashil@afrinic.net (ashil)</author>
			<category>Training</category>
			<pubDate>Thu, 10 Oct 2013 06:02:19 +0000</pubDate>
		</item>
		<item>
			<title>Internet number resource management module</title>
			<link>https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/136-internet-number-resource-management-module</link>
			<guid isPermaLink="true">https://meeting.afrinic.net/afrinic-19/en/agenda/36-training/136-internet-number-resource-management-module</guid>
			<description><![CDATA[<div class="feed-description"><p><strong>Introduction</strong></p>
<p>This module introduces you how we work, what services we offer and how to interact and request resources from AFRINIC and how to interact with the AFRINIC whois database. After concluding this workshop, participant will be able to :</p>
<p>• Describe what services are available from AFRINIC<br />• Apply for IP number resources from AFRINIC<br />• Explain the importance of the policy development process and how to take part in it.<br />• Query the whois database</p>
<p><strong>Target Audience</strong></p>
<p>• Network engineers and architects<br />• Network technicians and support staff</p>
<p>More information on this workshop is available on the AFRINIC Training website.</p>
<p><br /><br /></p></div>]]></description>
			<author>ashil@afrinic.net (ashil)</author>
			<category>Training</category>
			<pubDate>Thu, 10 Oct 2013 05:54:36 +0000</pubDate>
		</item>
	</channel>
</rss>
