logo learn
Call for Local Hosts - 2019 Closed Registration Link

IPv6 Security Training

Instructions 

As the Internet has become more critical to the way individuals, organisations and nations work, learn, play and do business, it has also become an attractive target for crime, and as such must be protected as a critical resource.

This workshop focuses on the security aspects of IPv6 from the network infrastructure to the services and devices. It is meant for both the networking and system admin professionals.

After attending this workshop, participants will be able to

  1. Describe the security implications and vulnerabilities in IPv6, from the core functionality protocols through the routing protocols to the applications
  2. Identify how to mitigate the security vulnerabilities identified
  3. Secure and verify network infrastructure (transition techniques, routing and key functionality protocols like ND)
  4. Secure and verify IPv6-enabled applications

Pre-requisits

  • Fundamental concepts in network and application security
  • Knowledge with the Linux/unix command line
  • Knowledge of network operating systems like Cisco IOS, Junos and Quagga

Modules Mode of Instructions

IPv6 Foundations

Presentations

IPv6 Security Technology demonstration on live equipment
 

Interactive exercises Group discussions

 

Hands-on exercises on our IPv6 testbed

IPv6 for Managers

 

Introduction

An often cited excuse for the lukewarm attitude towards IPv6 deployment has been "the business side doesn't see the need" or "there is no business case".

In order to bring total alignment within organisations, we realised that not only do we need to train the engineers on how to build the infrastructure and the service, but we also need to help the people that manage these engineers how to think strategically about IPv6 and support their technical guys in IPv6 deployment.

Effective IPv6 deployment is a more than configuring hardware. It requires proper planning, effective project management as well as integration into an organisation's business model and operations.

After attending this workshop, participants will be able to:

  • Identify the risks involved in not deploying IPv6.
  • List the opportunities that IPv6 will bring to their business.
  • Create a high level IPv6 implementation plan
  • Know what key questions to ask of their technical teams

Pre-requisites

None specifically. Just an eagerness to learn, discuss and share


Modules Mode of Instruction

IPv6 strategy and planning

Presentations

 

Group discussion

  Interactive exercises
  Collaborative brainstorming and mindmapping

List of Selected Host Countries

Further to our Call for Local Hosts for 2013 AFRINIC Training Workshops, we are pleased to announce the list of selected host countries:

  • Cameroon
  • Central African Republic
  • Gabon
  • Ethiopia
  • Kenya 
  • Zambia (AFRINIC-18)
  • Algeria 
  • Morocco
  • Tunisia
  • Lesotho
  • Malawi 
  • South Africa
  • Benin
  • Nigeria
  • Senegal

The selected hosts will be contacted individually for the next step.

{tab Tab Training Schedule Date And Destination}

Num. Country City Course Date Registration

1

Djibouti

Djibouti

INRM + IPv6

AFRINIC 20

Closed

2

South Africa

Cape Town

INRM + IPv6

24th - 27th June 

2014

Closed

3

Swaziland

Mbabane

INRM + IPv6

08th - 11th July

2014

Closed

4

Chad

NDjamena

INRM + IPv6

15th - 18th July

2014

Register  |   Enregistrer 

5

Nigeria

Abuja

INRM + IPv6

5th - 8th August

2014

 

6

Nigeria

Lagos

INRM + IPv6

12th - 15th August

2014

 

7

Senegal

Dakar

INRM + IPv6

26th - 29th August

2014

 

8

Cameroon

Yaounde

INRM + IPv6

30th Sept - 02nd

Oct 2014

 

9

Algeria

Algiers

INRM + IPv6

27th - 30th October

2014

 

10

Tanzania

Dar es saleem or

Zanzibar

INRM + IPv6

18th - 21st Nov

2014

 

11

Mauritius

Mauritius

INRM + IPv6

AFRINIC 21

 

Onsite Training Joining Instructions

Instructions 

Joining Instructions for each of our courses are usually sent out by e-mail to invited participants one weeks prior to the course to which they relate. However, this page lists some generic useful information for all courses.


Accomodation and refreshments

Our courses are non-residential so please make your own arrangements for the duration of the workshop. During the workshops, light refreshments will be served free of charge. It is however up to attendees to make other arrangements for their meals before and after the event.


Course times

Courses generally run from 8.30 to 17.30 each day but often we stay till 18:00 or more!  During the day, there are two short breaks and one long break for lunch and prayers in muslim countries.

Time Session

0830 - 0900

Registration and opening

0900 - 1100 Session #1
1100 - 1130 Tea break #1
1130 - 1300

Session #2

1300 - 1400

Lunch break

1400 - 1530

Session #3

1530 - 1600 Tea break #2
1600 - 1730 Session #4

 

Preparing for the workshop

Once invited for the workshop, participants should head to our website, download and review the relavant training materials. Participants to technical workshops are also required to come along with their own laptops which must have the following utilities installed:

  1. Virtualbox - a virtualisation software available freely from http://www.virtualbox.org/wiki/Downloads
  2. A telnet and/or SSH client to use to log into remote equipment. If your operating system does not have these installed, you can download and install the following free ones: 
  3. The AFRINIC whois client freely available from ftp://ftp.afrinic.net/pub/pub/db/whois3_afr.tar.gz.  Please note that although most Linux/unix operation systems have a whois client, these do not support most of the flags used by the AfriNIC whois server.
timeline