<div dir="ltr"><div class="gmail_quote">
Greetings Colleagues,<br>
<br>
Kindly find below our Tutorials during the Africa Internet Summit. Registration is open to all.<br>
We are grateful to EGCERT, ICANN, and M3AAWG for the training program<br>
Kindly register at <a href="https://2023.internetsummit.africa/" rel="noreferrer" target="_blank">https://2023.internetsummit.africa/</a> or contact the AIS Secretariat to receive meeting links.<br>
<br>
(Note: These tutorials will be online, and registration links differ for EGCERT Training, ICANN Training, and DDOS Training). You must register for each training if you want to attend all of them.<br>
<br>
19 - September. EGCERT Training: Incident Response 101.<br>
Time: 9 - 12 AM UTC<br>
Brief Description: During this session, we will learn more about incident response and dive deeper into some artifact types and how to analyze them.<br>
<br>
20- September. EGCERT Training: Forensic 101<br>
Time: 9 - 12 AM UTC<br>
Brief Description: In this Workshop, we will analyze the operating systems as Windows forensics and the critical artifacts an investigator can obtain from the investigation process.<br>
<br>
21- September: ICANN Training<br>
Time: 9 - 12 AM UTC<br>
<br>
Brief Description: DNS Prevention, Detection, Disruption, and Defense (Course for National Incident Response Teams and Security Teams)<br>
<br>
The training on DNS: Prevention, Detection, Disruption, and Defense offers a comprehensive introduction from a basic to an advanced level on how adversaries abuse and leverage the Domain Name System and domain registration services to carry out different types of attacks.<br>
<br>
Looking at both the technical aspect of the domain resolution process to the lifecycle of domain names, with a focus on the vulnerabilities in the processes and systems, participants in the training will gain an understanding of how they can prevent malicious activity, detect and disrupt it, as well as defend their specific constituencies.<br>
<br>
22- September : M3AAWG/AF-AAWG DDOS Workshop<br>
Time: 12:00 PM - 3 PM UTC<br>
<br>
• DDoS Resiliency Preparation Mini-Workshop<br>
12:00 UTC to 14:00 UTC <br>
Barry Raveendran Greene<br>
<br>
Abstract:<br>
ALL NETWORKS NEED A ROBUST DDOS SECURITY/RESILENCY ARCHITECTURE!<br>
<br>
Most networks do not have a DDoS Security/Resiliency architecture. They do not have a DDoS Incident playbook. They do not have meaningful “DDoS Security Conversations” with their Internet, cloud, IXP, and edge providers. <br>
<br>
When they have a DDoS plan, they do not think of conversations with their supply chain and business partners, opening the side doors of business risk. <br>
<br>
This mini-workshop will use a 9-part DDoS Preparation Playbook to walk through the essentials. We will teach the essential concepts within the framework of a DDoS Preparation Playbook.<br>
<br>
Why start with a DDoS Preparation Playbook? The DDoS Preparation Playbook focuses on action and preparation. All participants can use the DDoS Playbook in their organization to start their preparations and be ready for the next DDoS Attack. <br>
<br>
What will be covered? <br>
The DDoS Preparation Playbook will cover 9 areas that have proven to decrease the business risk of DDoS. These are based on decades of DDoS Incident Response and Architecture work. <br>
<br>
① Anticipate these Single Points of Failure<br>
② Verify your ISP’s DDoS Protection Capability<br>
③ Don’t Overestimate your Infrastructure<br>
④ Identify What you Need to Protect the Business<br>
⑤ Identify Acceptable Time to Mitigation<br>
⑥ Proactively Deploy a DDoS Protection Service <br>
⑦ Develop a DDoS Response Runbook (Playbook)<br>
⑧ Ensure Operational Readiness<br>
⑨ Collaboration for Impact<br>
<br>
<br>
•DDoS Detection and Mitigation<br>
14:00 – 15:00 <br>
Rich A Compton (M3AAWG DDOS SIG Chair).<br>
<br>
Abstract:<br>
This presentation is about DDoS attacks for engineers working at ISPs, hosting, or similar companies. The most common and latest types of DDoS attacks will be discussed. It will describe how engineers can use tools like Netflow to detect and mitigate DDoS attacks. Best practices will also be discussed, such as preventing DDoS attacks from affecting networks and reducing your customers and infrastructure from being used by attackers for sending out DDoS traffic, using up your resources.<br>
<br>
Thanks and Regards.<br>
<br>
AfricaCERT Secretariat.<br>
<br>
<br>
<br>
</div></div>