<?xml version="1.0" encoding="utf-8"?>
<!-- generator="Joomla! - Open Source Content Management" -->
<feed xmlns="http://www.w3.org/2005/Atom"  xml:lang="en-gb">
	<title type="text">titleAFRINIC-19 - Agenda
	<subtitle type="text"></subtitle>
	<link rel="alternate" type="text/html" href="https://meeting.afrinic.net"/>
	<id>https://meeting.afrinic.net/afrinic-19/en/agenda</id>
	<updated>2018-07-25T10:32:01+00:00</updated>
	<generator uri="http://joomla.org" version="2.5">Joomla! - Open Source Content Management</generator>
	<link rel="self" type="application/atom+xml" href="https://meeting.afrinic.net/afrinic-19/en/agenda?format=feed&amp;type=atom"/>
	<entry>
		<title>AFRINIC-19 Agenda</title>
		<link rel="alternate" type="text/html" href="https://meeting.afrinic.net/afrinic-19/en/agenda/programmex"/>
		<published>2013-10-24T07:25:32+00:00</published>
		<updated>2013-10-24T07:25:32+00:00</updated>
		<id>https://meeting.afrinic.net/afrinic-19/en/agenda/programmex</id>
		<author>
			<name>Rado</name>
			<email>rado@afrinic.net</email>
		</author>
		<summary type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p&gt;{loadposition mod-agenda-af19}&lt;/p&gt;
&lt;p&gt;---&lt;/p&gt;&lt;/div&gt;</summary>
		<content type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p&gt;{loadposition mod-agenda-af19}&lt;/p&gt;
&lt;p&gt;---&lt;/p&gt;&lt;/div&gt;</content>
		<category term="4_agenda" />
	</entry>
	<entry>
		<title>AfGWG-8</title>
		<link rel="alternate" type="text/html" href="https://meeting.afrinic.net/afrinic-19/en/agenda/afgwg-8"/>
		<published>2013-07-08T12:27:41+00:00</published>
		<updated>2013-07-08T12:27:41+00:00</updated>
		<id>https://meeting.afrinic.net/afrinic-19/en/agenda/afgwg-8</id>
		<author>
			<name>Avi</name>
			<email>avi@afrinic.net</email>
		</author>
		<summary type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;h5 class=&quot;p1&quot;&gt;&lt;a href=&quot;http://meeting.afrinic.net/afgwg/&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;&lt;img onmouseover=&quot;this.src='images/af19_assets/images/inner_pages/afgwg_up.jpg';&quot; onmouseout=&quot;this.src='images/af19_assets/images/inner_pages/afgwg.jpg';&quot; alt=&quot;afgwg&quot; src=&quot;images/af19_assets/images/inner_pages/afgwg.jpg&quot; height=&quot;132&quot; width=&quot;531&quot; /&gt;&lt;/i&gt;&lt;/a&gt;&lt;/h5&gt;
&lt;p&gt;[module-204]&lt;/p&gt;&lt;/div&gt;</summary>
		<content type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;h5 class=&quot;p1&quot;&gt;&lt;a href=&quot;http://meeting.afrinic.net/afgwg/&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;&lt;img onmouseover=&quot;this.src='images/af19_assets/images/inner_pages/afgwg_up.jpg';&quot; onmouseout=&quot;this.src='images/af19_assets/images/inner_pages/afgwg.jpg';&quot; alt=&quot;afgwg&quot; src=&quot;images/af19_assets/images/inner_pages/afgwg.jpg&quot; height=&quot;132&quot; width=&quot;531&quot; /&gt;&lt;/i&gt;&lt;/a&gt;&lt;/h5&gt;
&lt;p&gt;[module-204]&lt;/p&gt;&lt;/div&gt;</content>
		<category term="4_agenda" />
	</entry>
	<entry>
		<title>Policy discussions</title>
		<link rel="alternate" type="text/html" href="https://meeting.afrinic.net/afrinic-19/en/agenda/policy-discussions"/>
		<published>2013-07-08T12:27:23+00:00</published>
		<updated>2013-07-08T12:27:23+00:00</updated>
		<id>https://meeting.afrinic.net/afrinic-19/en/agenda/policy-discussions</id>
		<author>
			<name>Avi</name>
			<email>avi@afrinic.net</email>
		</author>
		<summary type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Part of the plenaries consist of policy discussions on the management and allocation of Internet Numbers for the African region through the participatory bottom-up approach helping define policies that address the needs of the community in Africa.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The policy discussions on Internet resource allocation and management in the AFRINIC Service region take place on two half days during the plenaries.&amp;nbsp;These policies are community-driven and anyone can propose and participate in discussions during the plenaries as well as on the policy discussion (rpd) mailing list.&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These sessions are characterised by lively debates where the community and participants express their views and concerns on several factors that affect Internet resources allocation and management. The policy proposals are presented at the event which has two co-chairs who moderate the deliberations.All policies follow a process whereby they are either approved, rejected or do not reach a consensus. In such cases, they are sent back to the mailing list for further discussion. &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You can read more on the&amp;nbsp;&lt;a href=&quot;https://www.afrinic.net/en/community/policy-development&quot; target=&quot;_blank&quot;&gt;Policy Development Process&lt;/a&gt;!&amp;nbsp;&lt;/p&gt;&lt;/div&gt;</summary>
		<content type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Part of the plenaries consist of policy discussions on the management and allocation of Internet Numbers for the African region through the participatory bottom-up approach helping define policies that address the needs of the community in Africa.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The policy discussions on Internet resource allocation and management in the AFRINIC Service region take place on two half days during the plenaries.&amp;nbsp;These policies are community-driven and anyone can propose and participate in discussions during the plenaries as well as on the policy discussion (rpd) mailing list.&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These sessions are characterised by lively debates where the community and participants express their views and concerns on several factors that affect Internet resources allocation and management. The policy proposals are presented at the event which has two co-chairs who moderate the deliberations.All policies follow a process whereby they are either approved, rejected or do not reach a consensus. In such cases, they are sent back to the mailing list for further discussion. &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;You can read more on the&amp;nbsp;&lt;a href=&quot;https://www.afrinic.net/en/community/policy-development&quot; target=&quot;_blank&quot;&gt;Policy Development Process&lt;/a&gt;!&amp;nbsp;&lt;/p&gt;&lt;/div&gt;</content>
		<category term="4_agenda" />
	</entry>
	<entry>
		<title>Key dates</title>
		<link rel="alternate" type="text/html" href="https://meeting.afrinic.net/afrinic-19/en/agenda/key-dates"/>
		<published>2013-07-08T12:26:44+00:00</published>
		<updated>2013-07-08T12:26:44+00:00</updated>
		<id>https://meeting.afrinic.net/afrinic-19/en/agenda/key-dates</id>
		<author>
			<name>Avi</name>
			<email>avi@afrinic.net</email>
		</author>
		<summary type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;h3&gt;Call for Papers - Call for Papers is now close&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Call for papers opens on 01 August 2013&lt;/li&gt;
&lt;li&gt;Call for papers closes on 29 August 2013&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Notification of acceptance on 5 September 2013&lt;/li&gt;
&lt;li&gt;Submission of presentations slides on 27 September 2013&lt;/li&gt;
&lt;li&gt;Deadline for submission of final presentation slides on 22 October 2013&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Call for Fellowship&amp;nbsp;- Call for Fellowship is now close&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Opens on 5 August 2013&lt;/li&gt;
&lt;li&gt;Closes on 27 August 2013&lt;/li&gt;
&lt;li&gt;Notification of selected fellows on 10 September 2013&lt;/li&gt;
&lt;li&gt;Deadline of acceptance by awarded fellow on 24 September 2013&lt;/li&gt;
&lt;li&gt;Final acceptance and publication of fellowsip list on 24 September 2013&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Meeting registration&amp;nbsp;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Online registration for AFRINIC training and plenary sessions opens on 21 August 2013&lt;/li&gt;
&lt;li&gt;Online registration for AFRINIC training and plenary sessions closes on &amp;nbsp;15 November 2013&lt;/li&gt;
&lt;li&gt;Onsite registration for AFRINIC training and plenary sessions opens on 23 November 2013&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/div&gt;</summary>
		<content type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;h3&gt;Call for Papers - Call for Papers is now close&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Call for papers opens on 01 August 2013&lt;/li&gt;
&lt;li&gt;Call for papers closes on 29 August 2013&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Notification of acceptance on 5 September 2013&lt;/li&gt;
&lt;li&gt;Submission of presentations slides on 27 September 2013&lt;/li&gt;
&lt;li&gt;Deadline for submission of final presentation slides on 22 October 2013&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Call for Fellowship&amp;nbsp;- Call for Fellowship is now close&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Opens on 5 August 2013&lt;/li&gt;
&lt;li&gt;Closes on 27 August 2013&lt;/li&gt;
&lt;li&gt;Notification of selected fellows on 10 September 2013&lt;/li&gt;
&lt;li&gt;Deadline of acceptance by awarded fellow on 24 September 2013&lt;/li&gt;
&lt;li&gt;Final acceptance and publication of fellowsip list on 24 September 2013&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Meeting registration&amp;nbsp;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Online registration for AFRINIC training and plenary sessions opens on 21 August 2013&lt;/li&gt;
&lt;li&gt;Online registration for AFRINIC training and plenary sessions closes on &amp;nbsp;15 November 2013&lt;/li&gt;
&lt;li&gt;Onsite registration for AFRINIC training and plenary sessions opens on 23 November 2013&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/div&gt;</content>
		<category term="4_agenda" />
	</entry>
	<entry>
		<title>Participate Online</title>
		<link rel="alternate" type="text/html" href="https://meeting.afrinic.net/afrinic-19/en/agenda/participate-online"/>
		<published>2013-07-08T11:52:58+00:00</published>
		<updated>2013-07-08T11:52:58+00:00</updated>
		<id>https://meeting.afrinic.net/afrinic-19/en/agenda/participate-online</id>
		<author>
			<name>Avi</name>
			<email>avi@afrinic.net</email>
		</author>
		<summary type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p&gt;We provide remote participation facilities for all those who are willing to participate in the plenary session discussions.&lt;/p&gt;
&lt;p&gt;Join AFRINIC-19 remotely through Jabber services; either through a web interface using your web browser, or through a conventional Jabber client. An instant messaging server allows you to post comments and/or questions to the meeting room in real time.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How to connect to the AFRINIC-19 Jabber Instant Messaging (IM) service:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;With a Jabber client&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A list of jabber clients can be found&lt;a href=&quot;http://xmpp.org/xmpp-software/clients/&quot;&gt;&amp;nbsp;here&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;After setting up your jabber clients/software if you don't have a jabber account, you can create one on jabber.org or gmail.com&lt;/li&gt;
&lt;li&gt;You have to register or sign in to your jabber server&lt;/li&gt;
&lt;li&gt;then select rooms ( please note that &quot;[at]&quot; should be replaced by &quot;@&quot;):&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;af19[at]conference.mtg.afrinic.net&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Without a Jabber client&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If you would like to participate, but are unable to setup a Jabber client, you're welcome to use the web interface available at:&amp;nbsp;&lt;a href=&quot;http://xmpp.afrinic.net/&quot;&gt;xmpp.afrinic.net&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Enter your name and log in. Enjoy! &amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;Alternatively send your comments and/or queries by email to&amp;nbsp;&lt;strong&gt;live-comments[at]AFRINIC.net&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;</summary>
		<content type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p&gt;We provide remote participation facilities for all those who are willing to participate in the plenary session discussions.&lt;/p&gt;
&lt;p&gt;Join AFRINIC-19 remotely through Jabber services; either through a web interface using your web browser, or through a conventional Jabber client. An instant messaging server allows you to post comments and/or questions to the meeting room in real time.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How to connect to the AFRINIC-19 Jabber Instant Messaging (IM) service:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;With a Jabber client&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A list of jabber clients can be found&lt;a href=&quot;http://xmpp.org/xmpp-software/clients/&quot;&gt;&amp;nbsp;here&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;After setting up your jabber clients/software if you don't have a jabber account, you can create one on jabber.org or gmail.com&lt;/li&gt;
&lt;li&gt;You have to register or sign in to your jabber server&lt;/li&gt;
&lt;li&gt;then select rooms ( please note that &quot;[at]&quot; should be replaced by &quot;@&quot;):&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;af19[at]conference.mtg.afrinic.net&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Without a Jabber client&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If you would like to participate, but are unable to setup a Jabber client, you're welcome to use the web interface available at:&amp;nbsp;&lt;a href=&quot;http://xmpp.afrinic.net/&quot;&gt;xmpp.afrinic.net&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Enter your name and log in. Enjoy! &amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;Alternatively send your comments and/or queries by email to&amp;nbsp;&lt;strong&gt;live-comments[at]AFRINIC.net&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;</content>
		<category term="4_agenda" />
	</entry>
	<entry>
		<title>Networking</title>
		<link rel="alternate" type="text/html" href="https://meeting.afrinic.net/afrinic-19/en/agenda/networking"/>
		<published>2013-07-08T11:52:01+00:00</published>
		<updated>2013-07-08T11:52:01+00:00</updated>
		<id>https://meeting.afrinic.net/afrinic-19/en/agenda/networking</id>
		<author>
			<name>Avi</name>
			<email>avi@afrinic.net</email>
		</author>
		<summary type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Networking events are held throughout the meeting. They are a great way to share and exchange ideas with your peers and colleagues about issues affecting the industry.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These events include cocktails and social dinners held in the evening after the conference. It is also a nice way to learn the local culture through artists who perfom at these events. All registered AFRINIC-19 participants are invited to the socials. &amp;nbsp;&lt;/p&gt;&lt;/div&gt;</summary>
		<content type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Networking events are held throughout the meeting. They are a great way to share and exchange ideas with your peers and colleagues about issues affecting the industry.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;These events include cocktails and social dinners held in the evening after the conference. It is also a nice way to learn the local culture through artists who perfom at these events. All registered AFRINIC-19 participants are invited to the socials. &amp;nbsp;&lt;/p&gt;&lt;/div&gt;</content>
		<category term="4_agenda" />
	</entry>
	<entry>
		<title>First Comers</title>
		<link rel="alternate" type="text/html" href="https://meeting.afrinic.net/afrinic-19/en/agenda/first-meeting"/>
		<published>2013-07-08T11:51:36+00:00</published>
		<updated>2013-07-08T11:51:36+00:00</updated>
		<id>https://meeting.afrinic.net/afrinic-19/en/agenda/first-meeting</id>
		<author>
			<name>Avi</name>
			<email>avi@afrinic.net</email>
		</author>
		<summary type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The First comers session is meant specifically for those new to AFRINIC meetings. It seeks to offer an understanding of what the Internet ecosystem means and stands for, and the organisations involved in the development and provision of the Internet in Africa. Issues such as Internet numbers, their provision and management, policy contents and names, research, infrastructure, capacity building, and security among others will be discussed as a way of helping newcomers and interested individuals what our meeting offers and achieves.&lt;/p&gt;&lt;/div&gt;</summary>
		<content type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The First comers session is meant specifically for those new to AFRINIC meetings. It seeks to offer an understanding of what the Internet ecosystem means and stands for, and the organisations involved in the development and provision of the Internet in Africa. Issues such as Internet numbers, their provision and management, policy contents and names, research, infrastructure, capacity building, and security among others will be discussed as a way of helping newcomers and interested individuals what our meeting offers and achieves.&lt;/p&gt;&lt;/div&gt;</content>
		<category term="4_agenda" />
	</entry>
	<entry>
		<title>Plenary Sessions</title>
		<link rel="alternate" type="text/html" href="https://meeting.afrinic.net/afrinic-19/en/agenda/plenary-sessions"/>
		<published>2013-07-08T11:51:18+00:00</published>
		<updated>2013-07-08T11:51:18+00:00</updated>
		<id>https://meeting.afrinic.net/afrinic-19/en/agenda/plenary-sessions</id>
		<author>
			<name>Avi</name>
			<email>avi@afrinic.net</email>
		</author>
		<summary type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;AFRINIC-19 plenary sessions span over three days following the Training sessions. They consist of an Africa Operators Day, Public Policy Discussions for the allocation and management of IP addresses and ASN, presentations on&amp;nbsp;technical &amp;nbsp;and internet governance issues,&amp;nbsp;updates of the African registry operations,RIR-IANA-ICANN updates, and several panel discussions. &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The plenaries bring the various stakeholder groups of the African ICT community together. Panel discussions revolve around &amp;nbsp;African ICT business and technical issues as well as its ecosystem:&amp;nbsp;IP addressing, domain names, registrars issues, cyberlaws, Peering, governance, networking, security and many more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;&lt;/div&gt;</summary>
		<content type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;AFRINIC-19 plenary sessions span over three days following the Training sessions. They consist of an Africa Operators Day, Public Policy Discussions for the allocation and management of IP addresses and ASN, presentations on&amp;nbsp;technical &amp;nbsp;and internet governance issues,&amp;nbsp;updates of the African registry operations,RIR-IANA-ICANN updates, and several panel discussions. &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The plenaries bring the various stakeholder groups of the African ICT community together. Panel discussions revolve around &amp;nbsp;African ICT business and technical issues as well as its ecosystem:&amp;nbsp;IP addressing, domain names, registrars issues, cyberlaws, Peering, governance, networking, security and many more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;&lt;/div&gt;</content>
		<category term="4_agenda" />
	</entry>
	<entry>
		<title>Trainings &amp; Workshops</title>
		<link rel="alternate" type="text/html" href="https://meeting.afrinic.net/afrinic-19/en/agenda/training-workshops"/>
		<published>2013-07-08T11:50:48+00:00</published>
		<updated>2013-07-08T11:50:48+00:00</updated>
		<id>https://meeting.afrinic.net/afrinic-19/en/agenda/training-workshops</id>
		<author>
			<name>Avi</name>
			<email>avi@afrinic.net</email>
		</author>
		<summary type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The wide range of Training topics during the Event usually include: IPv6 Workshops, Internet Resource Management Training, Cybersecurity workshops - Computer Emergency Response Team, Africa Internet Interconnections and Traffic Exchange, RPKI, DNSSEC, Africa Internet Standards workshops, Workshop on Network Technology, bandwidth management, iphone application management, BGP multihoming and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Please visit our &lt;a href=&quot;http://learn.afrinic.net/index.php/en/learn-modules&quot;&gt;AFRINIC Training website&lt;/a&gt;&amp;nbsp;for more information about our workshops and trainings.&amp;nbsp;&lt;/p&gt;
&lt;h3 style=&quot;text-align: justify;&quot;&gt;INRM MODULE&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;The Internet Number Resource Management module introduces how AFRINIC work, what services we offer and how to interact and request resources from AFRINIC and how to interact with the AFRINIC whois database.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;After concluding this workshop, participant will be able to:&lt;/p&gt;
&lt;p&gt;- Describe what services are available from AFRINIC&lt;/p&gt;
&lt;p&gt;- Apply for IP number resources from AFRINIC&lt;/p&gt;
&lt;p&gt;- Explain the importance of the policy development process and how to take part in it.&lt;/p&gt;
&lt;p&gt;- Query the whois database&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Target&amp;nbsp;Audience&lt;/h4&gt;
&lt;p&gt;- Network engineers and architects&lt;/p&gt;
&lt;p&gt;- Network technicians and support staff&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;IPv6 for Managers&lt;/h3&gt;
&lt;p&gt;The IPv6 for Managers module aims to close the knowledge gap and give advice to business executives on how to evaluate IPv6 strategically as well as support their technical people in deploying it.&lt;/p&gt;
&lt;h4&gt;Target audience&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Executives and managers&lt;/li&gt;
&lt;li&gt;Government regulators&lt;/li&gt;
&lt;li&gt;IT advisors to government officials&lt;/li&gt;
&lt;li&gt;An open mind&lt;/li&gt;
&lt;li&gt;A willingness to keep your organisation technologically relevant&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;IPv6 for Engineers&lt;/h3&gt;
&lt;p&gt;The IPv6 for Engineers Module is the keystone foundation module for all our technical workshops. It gives the participants a solid understanding of IPv6's core concepts and what&amp;nbsp;is required for understanding all other IPv6 topics. On completion of this module you will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identify, write and shorten IPv6 addresses&lt;/li&gt;
&lt;li&gt;List the types of IPv6 addresses and their unique characteristics&lt;/li&gt;
&lt;li&gt;Create an IPv6 address plan for a network&lt;/li&gt;
&lt;li&gt;Identify and list the equivalent IPv4 key protocols in IPv6&lt;/li&gt;
&lt;li&gt;Describe how NDP is used to deliver key IPv6 functions&lt;/li&gt;
&lt;li&gt;Configure and verify basic IPv6 on hosts and routers&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Target Audience&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Network engineers and architects&lt;/li&gt;
&lt;li&gt;Network technicians and support staff&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Pre-requisites&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;IPv4 Addressing and subnetting.&lt;/li&gt;
&lt;li&gt;The OSI model and the various protocols that operate at each layer.&lt;/li&gt;
&lt;li&gt;Intra-domain routing and OSPF.&lt;/li&gt;
&lt;li&gt;How to use the command line interfaces of key routing platforms (e.g Cisco IOS)&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Module outline&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;IPv4 address exhaustion - review, implications and consequences&lt;/li&gt;
&lt;li&gt;IPv6 address basics - notation and representation&lt;/li&gt;
&lt;li&gt;IPv6 addressing types&lt;/li&gt;
&lt;li&gt;IPv6 address planning&lt;/li&gt;
&lt;li&gt;IPv6 from an IPv4 perspective&lt;/li&gt;
&lt;li&gt;Understanding ND and key IPv6 mechanisms&lt;/li&gt;
&lt;li&gt;IPv6 address provisioning&lt;/li&gt;
&lt;li&gt;Stateless Automatic Address Configuration (SLAAC)&lt;/li&gt;
&lt;li&gt;Dynamic Host Configuration Protocol (DHCPv6)&lt;/li&gt;
&lt;li&gt;Basic IPv6 address configuration and verification on equipment&lt;/li&gt;
&lt;li&gt;Labs/Exercises&lt;/li&gt;
&lt;li&gt;Planning IPv6 address pace for a given network&lt;/li&gt;
&lt;li&gt;Configuring and verifying IPv6 on hosts (Windows, Mac OS X, Linux/Unix)&lt;/li&gt;
&lt;li&gt;Static Configuration&lt;/li&gt;
&lt;li&gt;Automatic Configuration&lt;/li&gt;
&lt;li&gt;Configuring and verifying IPv6 on routers&lt;/li&gt;
&lt;li&gt;Verifying IPv6 functioning using network packet captures (tcpdump, tshark etc)&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;CSIRT Training&lt;/h3&gt;
&lt;p&gt;The Computer Security Incident Response Team (CSIRT) training course aims to develop the knowledge and skills of staff members of a CSIRT or those interested in joining such a team, or involved in creating such a team.&lt;/p&gt;
&lt;h4&gt;Pre-requisites&lt;/h4&gt;
&lt;p&gt;Trainees are typically experienced system, network or IT managers (Interested persons from other backgrounds are welcome to contact the organisers to discuss the suitability of the course for them). They are expected to have an awareness of the security issues involved in connecting computers to the Internet. They must be committed to using their skills to improve the security of computers and networks. For the technical side of the course, familiarity with the normal operation of TCP/IP networks, addresses, port numbers and protocols will be assumed.&lt;/p&gt;
&lt;h4&gt;&amp;nbsp;The following modules are covered:&lt;/h4&gt;
&lt;h5&gt;CSIRT Organization&lt;/h5&gt;
&lt;p&gt;Describes how CSIRTs fit into their organisations: planning the CSIRT, defining the constituency of the team and gaining management authority for it, deciding the services the team will offer, working with those outside the organisation, staffing the CSIRT, funding. Participants will discuss their own organisation and how their team fits into it.&lt;/p&gt;
&lt;h5&gt;Technical Introduction&lt;/h5&gt;
&lt;p&gt;A basic introduction to the main attack vectors that malicious parties use to attack systems: intruders and their motivations, botnets, network protocols and how they can be abused, operating systems and services, types of vulnerability, information gathering, breaking in, hiding traces, denial-of-service attacks.&lt;/p&gt;
&lt;h5&gt;CSIRT Operations&lt;/h5&gt;
&lt;p&gt;Describes the facilities, systems and tools needed by CSIRTs to operate successfully: housing the CSIRT, equipment, e-mail, remote access, information and contacts, servers and networks, incident response plans and procedures, tracking systems. As an exercise participants will discuss and develop incident response plans for their own teams.&amp;nbsp;&lt;/p&gt;
&lt;h5&gt;Legal Issues&amp;nbsp;&lt;/h5&gt;
&lt;p&gt;A high level overview of the areas of legislation that are likely to affect CSIRTs in their work and that team members need to be aware of: origins of computer legislation, problems, data protection, computer misuse, working with law enforcement, monitoring, evidence, European developments.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;JPCERT&lt;/h3&gt;
&lt;p&gt;CSIRT training for technical staff: advanced network monitoring. This is a one-day&amp;nbsp;workshop focusing on advance web security.&lt;/p&gt;
&lt;p&gt;Description&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This is a one-day&amp;nbsp;workshop focusing on advance web security.&lt;/p&gt;
&lt;h4&gt;Course&lt;/h4&gt;
&lt;p&gt;Network Monitoring and Traffic Analysis (Advanced)&lt;/p&gt;
&lt;h4&gt;Abstract&lt;/h4&gt;
&lt;p&gt;Network monitoring is one of the ways to understand what is happening within the network. This session will cover the basic knowledge of network monitoring and issues that we should know (Ex: legal issues, privacy issues, encryption, covert channel, etc.). This training course provide participants hands-on experience on analysing traffic generated by malware, botnet and other malicious tools.&lt;/p&gt;
&lt;h3&gt;AfricaCERT Day&lt;/h3&gt;
&lt;p&gt;AfricaCERT meetings provide a forum for collaboration and exchange for Computer Emergency response Teams and interested parties to sharing common practices, information, tools, techniques, and strategies that address problems related to cyber-security.&lt;/p&gt;
&lt;p&gt;AfricaCERT Day builds on the experience from previous AfricaCERT events held in different African countries in collaboration with AfNOG and AFRINIC.&lt;/p&gt;
&lt;p&gt;AfricaCERT V Day follows three days of Intensive training in collaboration with FIRST and JPCERT.&lt;/p&gt;
&lt;p&gt;AfricaCERT V theme is “Our Role in the African Internet Ecosystem”.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;DNNSEC&lt;/h3&gt;
&lt;h4&gt;Target Audience&lt;/h4&gt;
&lt;p&gt;The DNSSEC Workshop targets Operators interested in deploying DNS Security as part of their security infrastructure and people with a general interest in DNSSEC, and those contemplating whether or not to deploy DNSSEC in their organisation.&lt;/p&gt;
&lt;h4&gt;Pre-requisites&lt;/h4&gt;
&lt;p&gt;Basic DNS, Public key encryption and basic knowledge about UNIX System&amp;nbsp;Administration&lt;/p&gt;
&lt;h4&gt;Course Outline&lt;/h4&gt;
&lt;p&gt;This tutorial covers the following topics:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Introduction/Review of DNSSEC&lt;/li&gt;
&lt;li&gt;Securing zone transfer (TSIG)&lt;/li&gt;
&lt;li&gt;Securing a zone&lt;/li&gt;
&lt;li&gt;Configuring a security-aware resolver&lt;/li&gt;
&lt;li&gt;Delegation of signing authority&lt;/li&gt;
&lt;li&gt;Rolling keys&lt;/li&gt;
&lt;li&gt;Troubleshooting&lt;/li&gt;
&lt;li&gt;DPS&lt;/li&gt;
&lt;li&gt;DNSSEC deployment plan&lt;/li&gt;
&lt;li&gt;OpenDNSSEC&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Technologies Covered&lt;/h4&gt;
&lt;p&gt;DNS, TSIG, DNSSEC including NSEC3&lt;/p&gt;
&lt;p&gt;Please visit our&amp;nbsp;&lt;a href=&quot;http://learn.afrinic.net/index.php/en/learn-modules&quot;&gt;AFRINIC Training website&lt;/a&gt;&amp;nbsp;for more information about our workshops and trainings.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/div&gt;</summary>
		<content type="html">&lt;div class=&quot;feed-description&quot;&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The wide range of Training topics during the Event usually include: IPv6 Workshops, Internet Resource Management Training, Cybersecurity workshops - Computer Emergency Response Team, Africa Internet Interconnections and Traffic Exchange, RPKI, DNSSEC, Africa Internet Standards workshops, Workshop on Network Technology, bandwidth management, iphone application management, BGP multihoming and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Please visit our &lt;a href=&quot;http://learn.afrinic.net/index.php/en/learn-modules&quot;&gt;AFRINIC Training website&lt;/a&gt;&amp;nbsp;for more information about our workshops and trainings.&amp;nbsp;&lt;/p&gt;
&lt;h3 style=&quot;text-align: justify;&quot;&gt;INRM MODULE&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;The Internet Number Resource Management module introduces how AFRINIC work, what services we offer and how to interact and request resources from AFRINIC and how to interact with the AFRINIC whois database.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;After concluding this workshop, participant will be able to:&lt;/p&gt;
&lt;p&gt;- Describe what services are available from AFRINIC&lt;/p&gt;
&lt;p&gt;- Apply for IP number resources from AFRINIC&lt;/p&gt;
&lt;p&gt;- Explain the importance of the policy development process and how to take part in it.&lt;/p&gt;
&lt;p&gt;- Query the whois database&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Target&amp;nbsp;Audience&lt;/h4&gt;
&lt;p&gt;- Network engineers and architects&lt;/p&gt;
&lt;p&gt;- Network technicians and support staff&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;IPv6 for Managers&lt;/h3&gt;
&lt;p&gt;The IPv6 for Managers module aims to close the knowledge gap and give advice to business executives on how to evaluate IPv6 strategically as well as support their technical people in deploying it.&lt;/p&gt;
&lt;h4&gt;Target audience&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Executives and managers&lt;/li&gt;
&lt;li&gt;Government regulators&lt;/li&gt;
&lt;li&gt;IT advisors to government officials&lt;/li&gt;
&lt;li&gt;An open mind&lt;/li&gt;
&lt;li&gt;A willingness to keep your organisation technologically relevant&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;IPv6 for Engineers&lt;/h3&gt;
&lt;p&gt;The IPv6 for Engineers Module is the keystone foundation module for all our technical workshops. It gives the participants a solid understanding of IPv6's core concepts and what&amp;nbsp;is required for understanding all other IPv6 topics. On completion of this module you will be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identify, write and shorten IPv6 addresses&lt;/li&gt;
&lt;li&gt;List the types of IPv6 addresses and their unique characteristics&lt;/li&gt;
&lt;li&gt;Create an IPv6 address plan for a network&lt;/li&gt;
&lt;li&gt;Identify and list the equivalent IPv4 key protocols in IPv6&lt;/li&gt;
&lt;li&gt;Describe how NDP is used to deliver key IPv6 functions&lt;/li&gt;
&lt;li&gt;Configure and verify basic IPv6 on hosts and routers&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Target Audience&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Network engineers and architects&lt;/li&gt;
&lt;li&gt;Network technicians and support staff&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Pre-requisites&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;IPv4 Addressing and subnetting.&lt;/li&gt;
&lt;li&gt;The OSI model and the various protocols that operate at each layer.&lt;/li&gt;
&lt;li&gt;Intra-domain routing and OSPF.&lt;/li&gt;
&lt;li&gt;How to use the command line interfaces of key routing platforms (e.g Cisco IOS)&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Module outline&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;IPv4 address exhaustion - review, implications and consequences&lt;/li&gt;
&lt;li&gt;IPv6 address basics - notation and representation&lt;/li&gt;
&lt;li&gt;IPv6 addressing types&lt;/li&gt;
&lt;li&gt;IPv6 address planning&lt;/li&gt;
&lt;li&gt;IPv6 from an IPv4 perspective&lt;/li&gt;
&lt;li&gt;Understanding ND and key IPv6 mechanisms&lt;/li&gt;
&lt;li&gt;IPv6 address provisioning&lt;/li&gt;
&lt;li&gt;Stateless Automatic Address Configuration (SLAAC)&lt;/li&gt;
&lt;li&gt;Dynamic Host Configuration Protocol (DHCPv6)&lt;/li&gt;
&lt;li&gt;Basic IPv6 address configuration and verification on equipment&lt;/li&gt;
&lt;li&gt;Labs/Exercises&lt;/li&gt;
&lt;li&gt;Planning IPv6 address pace for a given network&lt;/li&gt;
&lt;li&gt;Configuring and verifying IPv6 on hosts (Windows, Mac OS X, Linux/Unix)&lt;/li&gt;
&lt;li&gt;Static Configuration&lt;/li&gt;
&lt;li&gt;Automatic Configuration&lt;/li&gt;
&lt;li&gt;Configuring and verifying IPv6 on routers&lt;/li&gt;
&lt;li&gt;Verifying IPv6 functioning using network packet captures (tcpdump, tshark etc)&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;CSIRT Training&lt;/h3&gt;
&lt;p&gt;The Computer Security Incident Response Team (CSIRT) training course aims to develop the knowledge and skills of staff members of a CSIRT or those interested in joining such a team, or involved in creating such a team.&lt;/p&gt;
&lt;h4&gt;Pre-requisites&lt;/h4&gt;
&lt;p&gt;Trainees are typically experienced system, network or IT managers (Interested persons from other backgrounds are welcome to contact the organisers to discuss the suitability of the course for them). They are expected to have an awareness of the security issues involved in connecting computers to the Internet. They must be committed to using their skills to improve the security of computers and networks. For the technical side of the course, familiarity with the normal operation of TCP/IP networks, addresses, port numbers and protocols will be assumed.&lt;/p&gt;
&lt;h4&gt;&amp;nbsp;The following modules are covered:&lt;/h4&gt;
&lt;h5&gt;CSIRT Organization&lt;/h5&gt;
&lt;p&gt;Describes how CSIRTs fit into their organisations: planning the CSIRT, defining the constituency of the team and gaining management authority for it, deciding the services the team will offer, working with those outside the organisation, staffing the CSIRT, funding. Participants will discuss their own organisation and how their team fits into it.&lt;/p&gt;
&lt;h5&gt;Technical Introduction&lt;/h5&gt;
&lt;p&gt;A basic introduction to the main attack vectors that malicious parties use to attack systems: intruders and their motivations, botnets, network protocols and how they can be abused, operating systems and services, types of vulnerability, information gathering, breaking in, hiding traces, denial-of-service attacks.&lt;/p&gt;
&lt;h5&gt;CSIRT Operations&lt;/h5&gt;
&lt;p&gt;Describes the facilities, systems and tools needed by CSIRTs to operate successfully: housing the CSIRT, equipment, e-mail, remote access, information and contacts, servers and networks, incident response plans and procedures, tracking systems. As an exercise participants will discuss and develop incident response plans for their own teams.&amp;nbsp;&lt;/p&gt;
&lt;h5&gt;Legal Issues&amp;nbsp;&lt;/h5&gt;
&lt;p&gt;A high level overview of the areas of legislation that are likely to affect CSIRTs in their work and that team members need to be aware of: origins of computer legislation, problems, data protection, computer misuse, working with law enforcement, monitoring, evidence, European developments.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;JPCERT&lt;/h3&gt;
&lt;p&gt;CSIRT training for technical staff: advanced network monitoring. This is a one-day&amp;nbsp;workshop focusing on advance web security.&lt;/p&gt;
&lt;p&gt;Description&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This is a one-day&amp;nbsp;workshop focusing on advance web security.&lt;/p&gt;
&lt;h4&gt;Course&lt;/h4&gt;
&lt;p&gt;Network Monitoring and Traffic Analysis (Advanced)&lt;/p&gt;
&lt;h4&gt;Abstract&lt;/h4&gt;
&lt;p&gt;Network monitoring is one of the ways to understand what is happening within the network. This session will cover the basic knowledge of network monitoring and issues that we should know (Ex: legal issues, privacy issues, encryption, covert channel, etc.). This training course provide participants hands-on experience on analysing traffic generated by malware, botnet and other malicious tools.&lt;/p&gt;
&lt;h3&gt;AfricaCERT Day&lt;/h3&gt;
&lt;p&gt;AfricaCERT meetings provide a forum for collaboration and exchange for Computer Emergency response Teams and interested parties to sharing common practices, information, tools, techniques, and strategies that address problems related to cyber-security.&lt;/p&gt;
&lt;p&gt;AfricaCERT Day builds on the experience from previous AfricaCERT events held in different African countries in collaboration with AfNOG and AFRINIC.&lt;/p&gt;
&lt;p&gt;AfricaCERT V Day follows three days of Intensive training in collaboration with FIRST and JPCERT.&lt;/p&gt;
&lt;p&gt;AfricaCERT V theme is “Our Role in the African Internet Ecosystem”.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;DNNSEC&lt;/h3&gt;
&lt;h4&gt;Target Audience&lt;/h4&gt;
&lt;p&gt;The DNSSEC Workshop targets Operators interested in deploying DNS Security as part of their security infrastructure and people with a general interest in DNSSEC, and those contemplating whether or not to deploy DNSSEC in their organisation.&lt;/p&gt;
&lt;h4&gt;Pre-requisites&lt;/h4&gt;
&lt;p&gt;Basic DNS, Public key encryption and basic knowledge about UNIX System&amp;nbsp;Administration&lt;/p&gt;
&lt;h4&gt;Course Outline&lt;/h4&gt;
&lt;p&gt;This tutorial covers the following topics:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Introduction/Review of DNSSEC&lt;/li&gt;
&lt;li&gt;Securing zone transfer (TSIG)&lt;/li&gt;
&lt;li&gt;Securing a zone&lt;/li&gt;
&lt;li&gt;Configuring a security-aware resolver&lt;/li&gt;
&lt;li&gt;Delegation of signing authority&lt;/li&gt;
&lt;li&gt;Rolling keys&lt;/li&gt;
&lt;li&gt;Troubleshooting&lt;/li&gt;
&lt;li&gt;DPS&lt;/li&gt;
&lt;li&gt;DNSSEC deployment plan&lt;/li&gt;
&lt;li&gt;OpenDNSSEC&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Technologies Covered&lt;/h4&gt;
&lt;p&gt;DNS, TSIG, DNSSEC including NSEC3&lt;/p&gt;
&lt;p&gt;Please visit our&amp;nbsp;&lt;a href=&quot;http://learn.afrinic.net/index.php/en/learn-modules&quot;&gt;AFRINIC Training website&lt;/a&gt;&amp;nbsp;for more information about our workshops and trainings.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/div&gt;</content>
		<category term="4_agenda" />
	</entry>
</feed>
