RPKI Deployment on VyOS
Global Internet infrastructure is vulnerable as its core routing protocol (BGP) has been suffering from prefix hijack, route leaks and bad filtering. Our Internet has experienced many outages due to BGP routing incidents. RPKI can help reduce the impact of those BGP incidents significantly. This webinar would cover the basics of RPKI and how we can deploy RPKI Route Origin Validation on VyOS platform.
In this course, we will cover:
- RPKI fundamentals
- RPKI Route Origin Authorisation
- RPKI Route Origin Validation on VyOS
Aris Cahyadi Risdianto
Aris is a former systems and network professional in the telecommunications field who has been involved in designing, implementing, migrating, and maintaining IP-based networks for enterprises and service providers. He is experienced in working with system/network vendors and mobile/cable-based telecommunications operators. He has been serving as an ambassador for the Open Networking Foundation (ONF) since 2018 and was a part of the ambassadors’ steering committee team in 2019 and 2023. Currently, he is actively working on building software-based solutions and testing environments for Future Internet, Cloud Computing, and Cyber Security.
Aris shares his knowledge as a volunteer community trainer.
Md Abdullah Al Naser
Naser is a professional IP network enthusiast with extensive experience working in large ISPs, telecoms, and enterprise network infrastructures. He specializes in planning and designing complex network solutions for both service providers and corporate networks, with expertise in advanced routing protocols such as OSPF, IS-IS, and BGP, as well as IPv6 and MPLS. Alongside his profession, Naser is also involved in technical writing and providing technical training within his capacity.
Qazi Shamsud Tahmeed
Q S Tahmeed has more than 17 years of experience working in ISP/NSP entities in Bangladesh. He has strong knowledge and experience in the design, development & operation of scalable and resilient network infrastructure and services. His technical interest areas include Internet Routing & Security, OSPF, IPv6 Deployment, Network Automation, MPLS, Network Security, Segment Routing.
Tahmeed shares his knowledge as the retained community trainer in Bangladesh for APNIC.
Md. Rafeeun Noby Babir
Md. Rafeeun Noby Babir is an accomplished professional in the field of Telecommunications and Information Technology. With an extensive experience in the network industry in Bangladesh, Babir has made significant contributions in Gateway Operations, specializing in International Internet Gateway (IIG), International Terrestrial Cable (ITC), National Internet Exchange (NIX) as well as Nationwide Internet Service Provider (ISP).
Babir’s expertise extends towards Network Servers and Security along with Routing and Switching. He possesses in-depth knowledge of BGP core networks. Along with a degree in ECE from KUET, he also holds certifications from industry-leading organizations like Cisco (CCNP, Specialist), Juniper (JNCIA), Huawei (HCIA), Red Hat (RHCE, RHCSA) and demonstrates his commitment to professional excellence.
Babir shares his knowledge as a volunteer community trainer for APNIC.
Shaqayeq (Shay) Saleh
Shaqayeq (Shay) Saleh Senior Network Engineer (Datacenter and Virtualization) at Aussie Broadband. She is an energetic, dynamic, results-oriented and problem solver with over a decade proven experience in infrastructure design, network security, network administration and service provider network. Her industry exposure spans telecommunications, Internet registry and education providers. Shaqayeq holds certifications in network and security as well as a master’s in information technology (Network Management).
Shaqayeq (Shay) Saleh shares her knowledge as a volunteer community trainer.
Subhashini has worked as an Engineer and Manager in Telecommunication and ICT fields since 2007 in different vendor and operator platforms. Her Experience includes Telco applications planning, maintenance and Solution delivery, Telco core network, ISP operation management and Security governance. She is a Volunteer trainer in LKNOG and a founding committee member of LKNOG, a former Fellow at APNIC 42 and 48 events and attended the first APNIC Hackathon. As a Voluntary speaker and organiser, she supports Women in ICT forums, APNIC NFH SEA and LKNOG events.
Technical Interest areas include Network and application Security, IPV6, DNS and DNSSEC.
Subhashini shares her knowledge as the retained community trainer in Sri Lanka for APNIC.
Affan Basalamah is an experienced IT Network & Telecom consultant with a diverse background in various corporations, including higher education institutions, Islamic multinational businesses, and the largest telecommunications operator in Indonesia. He received his degree from the Institut Teknologi Bandung, where he also served as an IT/network administrator and later as Head of IT Infrastructure for the IT Directorate for over 10 years. During this time, he was involved in the construction of Indonesia’s first higher education network (INHERENT) and frequently spoke at IT conferences such as IDNOG and APAN.
Affan shares his knowledge as a volunteer community trainer.
Packets don’t lie – Threat Hunting with Zeek
One of the methods to identify, process and gain visibility into a network is Network Security Monitoring(NSM). Zeek is a passive network security monitor and is Open Source. In this course will use Zeek to analyse PCAPs and find badness.
In this course, participants should be able to
– Gain an understanding on the value of Zeek in the context of Network Security Monitoring(NSM)
– Analyse PCAPs using Zeek
– Get an overview of Zeek and Zeek logs
Breach and Attack Simulation Tools
Information and Network Security is a broad topic, and as such this webinar will look at a variety of topics covering theory, technical controls, and organisational best practices.
The focus of the webinar is to introduce Breach and Attack Simulation (BAS) concepts by explaining various tools and strategies to test defenses to determine the overall security posture of the organisation.
This course will cover the following topics:
- What is Breach and Attack Simulation (BAS)
- Why Use BAS tools
- Overview of the MITRE ATT&CK Matrix
- List of Open Source tools
- Overview of the various tools
- Setting up a simulation