Universiti Sains Malaysia (USM) and Malaysian Research and Education Network (MYREN) is organizing the SecureAsi@ workshop in Cyberjaya, Malaysia. This three-day workshop which start from 23rd – 25th October 2017 is aimed at bringing Asi@Connect partners’ network engineers and security administrators to the level qualified for the operation & management of network for their NRENs and therefore promote international collaborations as well as Asi@Connect applications. For this purpose, this workshop brings in three security experts as the instructors from USM and University of Hamburg (UH), Germany.
As more and more security breaches being reported throughout the globe, it is such necessary that NRENs are more equipped to proactively identify potential security issues in their network BEFORE they are being exploited by hackers and malware. For that reason, this workshop aims to provide a combination of theoretical and practical knowledge/experience to the participants of the workshop in terms of a more secure NREN.
- To provide an overview of Cybersecurity.
- To familiarize with concepts of malware, botnet, social engineering and other threats.
- To learn the latest Internet security techniques, firewalls etc.
- To provide a basic knowledge of ethical hacking using Kali Linux.
- Network and Physical Security
- Malware and Botnets
- Distributed Denial of Service (DDoS) Attacks
- Linux and Networking (Refresher)
- Network Monitoring and Intrusion Detection Systems (IDSs)
- Honeypots and Malware Sandboxes
- Authentication and Access Control
- Identifying and Addressing Vulnerabilities
- Penetration Testing
- Capture The Flag (CTF) Session
WHO IS ELIGIBLE
All AsiaConnect partners within the category of developing countries. Selected countries are able to send up to two participants.
Partners that can send one candidate (7):
Bangladesh (BD), India (IN), Pakistan (PK), Philippines (PH), Sri Lanka (LK), Thailand (TH), and Vietnam (VN).
Partners that can send two candidates (9):
Afghanistan (AF), Bhutan (BT), Cambodia (KH), Laos (LA), Mongolia (MN), Myanmar (MM), Nepal (NP), Indonesia (ID) and Malaysia (MY).
WHAT IS COVERED?
- Economic round trip flight from the participant’s country to Kuala Lumpur
- Accommodation for 5 days 4 nights at Tune Hotel, Cyberjaya
- Meals during workshop
- 1x Social Dinner
HOW TO APPLY
Link to Register: https://goo.gl/forms/WJfybztlbqtLnYOY2
Lookout for more updates on www.facebook.com/SecureAsia and our email blasts
Instructors’ profile :
- Dr. Selvakumar Manickam is a senior lecturer and researcher at National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia. He has authored and co-authored almost 130 articles in journals, conference proceedings and book reviews. He has graduated 7 PhDs and completed many Masters and undergraduate thesis/dissertation. He has given several key note speeches as well as dozens of invited lectures and workshops at conferences, international universities and for industry. He has given talks on Internet Security, Internet of Things, Industry 4.0, IPv6, Green ICT and Open Source technologies at various organizations and seminars. Currently, he is involved a number of key clusters under National Advanced IPv6 Centre, namely Internet Security, Cloud Computing and Internet of Things (IoT), with focus on conducting scientific research in these respective areas. As of date, Dr. Selva has garnered funding in the form of grants and industrial projects worth almost RM2 million. Some of the national and international organization that Dr. Selva is involved in includes MyREN (as Working Group head for Internet Security), IPv6 Forum Global (as co-chair for IPv6 Education), committee member or representative at various technical forums locally and globally. He also lectures in various Computer Science and IT courses which includes development of new courseware in tandem with current technology trend. Apart from that, as senior trainer, he is actively involved in conducting professional courses on Cybersecurity, Cloud Computing, SDN, IPv6, and other networking-related technologies. He also codes in Android, Java, .net, C, PHP and Python in relation to the R&D work and projects he is involved in.
- Prof. Dr. Mathias Fischer is an assistant professor at the University Hamburg since September 2016. Before that, he was an assistant professor at the University Münster (2015-16), a Postdoc at the International Computer Science Institute (ICSI) / UC Berkeley (2014-15), and Postdoc at the Center for Advanced Security Research Darmstadt (CASED) / TU Darmstadt from (2012-14). His research interests encompass IT and network security, resilient distributed systems, network monitoring, and botnets. Mathias received a PhD in 2012 and a diploma in computer science in 2008, both from TU Ilmenau.
- Dr. Shankar Karuppayah is a Senior Lecturer at the National Advanced IPv6 Centre, Universiti Sains Malaysia since June 2016. Previously, he was attached to the Center for Advanced Security Research Darmstadt (CASED) / TU Darmstadt, Germany (2012-2016) where he also obtained his PhD. He received his M.Sc. (Software Systems Engineering) from a collaboration programme between RWTH Aachen, Germany and KMUTNB, Thailand in 2011 and B.Sc. (Computer Sciences) from Universiti Sains Malaysia in 2009. His research interests encompass Internet of Things (IoT), IT and network security, network monitoring, and botnets. Besides actively giving talks and workshops on the topic of cybersecurity, he is also actively engaged with the industry on several projects on security and Internet of Things.
|Session 1||Network and Physical Security||SM, MF||X|
|Session 2||Malware and Botnets||SK, MF||X|
|Session 3||(Distributed) Denial of Service (DDoS/DoS) Attacks||MF, SM||X||X|
|Session 4||Social Engineering Attacks and Ethical Hacking||SM, MF||X|
|Session 1||Linux and Networking (Refresher)||SM, SK||X|
|Session 2||Network Monitoring, and Intrusion Detection Systems (IDSs)||SM, MF||X||X|
|Session 3||Honeypots and Malware Sandboxes||MF, SK||X||X|
|Session 4||Authentication and Access Control||SM, SK||X|
|Session 1||Identifying and Addressing Vulnerabilities (Part 1)||SK, SM||X|
|Session 2||Identifying and Addressing Vulnerabilities (Part 2)||SK, SM||X|
|Session 3||Penetration Testing||SM, MF||X|
|Session 4||Capture the Flag (CTF) Session||SK,SM,MF||X|
Further inquiries can be forwarded to firstname.lastname@example.org