Difference between revisions of "Cybersecurity Resilience Workshop -Track 1: Securing institutional e-mail, websites and identity systems"
(→TimeTable) |
|||
| Line 99: | Line 99: | ||
{| class="wikitable" style="width:100%;" | {| class="wikitable" style="width:100%;" | ||
| − | |+ Track | + | |+ Track 2 Schedule |
| − | ! Time !! Day 1 ( | + | ! Time !! Day 1 (Switching) !! Day 2 (IPv6) !! Day 3 (Dual-Stack) !! Day 4 (Wireless) !! Day 5 (Operations) |
|- | |- | ||
| − | | **07:00** || **Welcome | + | | **07:00** || **Welcome and registrations** || colspan="4" style="background:#eee; text-align:center;" | ''Sessions start at 08:00'' |
|- | |- | ||
| − | | **08:00** || ** | + | | **08:00** || **Pre-Training Session (JOINT)** || style="background:#f9f9f9;" | '''Day 1 Recap''' || style="background:#f9f9f9;" | '''Day 2 Recap''' || style="background:#f9f9f9;" | '''Day 3 Recap''' || style="background:#f9f9f9;" | '''Day 4 Recap''' |
|- | |- | ||
| − | | **08:20** || **Housekeeping** || | + | | **08:20** || **Housekeeping (JOINT)** || **Module 2:** Security Landscape in IPv4 and IPv6 || **Module 5:** Dual Stack Configuration on Linux || **New Module:** Wi-Fi Security: WPA3, Enterprise Auth (802.1X), and Rogue AP Detection || **Module 8:** Monitoring, Logging and Troubleshooting |
|- | |- | ||
| − | | **09:00** || **Project | + | | **09:00** || **Project overview (JOINT)** || **Module 3:** Transitioning to IPv6 – Strategy and Security Considerations || **Module 6:** Publishing and Securing Web, DNS, and Mail Services || **New Module:** 802.1X & Rogue AP Detection || **New Module:** Network Security Audit: Pen-testing your own Campus Infrastructure |
|- | |- | ||
| − | | **10:00** || | + | | style="background:#eef;" | **10:00** || style="background:#eef;" | '''Tea break''' || style="background:#eef;" | '''Tea break''' || style="background:#eef;" | '''Tea break''' || style="background:#eef;" | '''Tea break''' || style="background:#eef;" | '''Tea break''' |
|- | |- | ||
| − | | ** | + | | **10:30** || **New Module:** Campus Network Design: High-Performance Switching || **Module 4:** Dual Stack Concepts & Institutional Planning || **Module 7:** Dual Stack Firewalling and Hardening || **Integrated Module:** eduroam in the Campus Context || **New Module:** Pen-testing (Asset Verification) |
|- | |- | ||
| − | | **13:00** || **Lunch | + | | **13:00** || **Lunch break** || **Lunch break** || **Lunch break** || **Lunch break** || **Lunch break** |
|- | |- | ||
| − | | **14:00** || ** | + | | **14:00** || **New Module:** Layer 2 Security Best Practices || **Lab: IPv6 Implementation** || **Module 7:** (Continued) || **New Module:** Secure Wireless LAN Controllers || **Final Review: Institutional Planning** |
|- | |- | ||
| − | | ** | + | | **15:30** || **Module 1:** Introduction to IP Addressing and Routing || **Review Session** || **Services Lab** || **Wireless Lab** || **Final Assessment** |
|- | |- | ||
| − | | style="background:#f0f0f0;" | **16:30** || **Day | + | | **16:00** || **Tea break** || **Tea break** || **Tea break** || **Tea break** || **Tea break** |
| + | |- | ||
| + | | style="background:#f0f0f0;" | **16:30** || **Day 1 Recap** || **Day 2 Recap** || **Day 3 Recap** || **Day 4 Recap** || **Final Recap & Closing** | ||
|- | |- | ||
| **17:00** || **End of Day 1** || **End of Day 2** || **End of Day 3** || **End of Day 4** || **End of Training** | | **17:00** || **End of Day 1** || **End of Day 2** || **End of Day 3** || **End of Day 4** || **End of Training** | ||
Revision as of 11:46, 24 January 2026
KENET is pleased to invite you to the Cybersecurity Resilience Workshop - Track 1. This track focuses on fortifying the institutional digital perimeter by mastering the core protocols of DNS, Email, and Identity. Participants will transition from managing local services to building a "Circle of Trust" through the deployment of DNSSEC, DMARC/SPF/DKIM email protections, and eduroam infrastructure. The training will be held from January 25th-January 30th, 2026, at the Boma Inn Eldoret.
The training will be held from January 19th-January 23rd, 2026.
Contents
Objective
By the end of the program, attendees will be capable of architecting a full-lifecycle Identity Management (IdM) system, configuring an Identity Provider (IdP) for global federation, and ensuring all services meet international compliance and security standards. The ultimate objective is to provide seamless, secure access to resources while protecting the institution's brand and data integrity from modern cyber threats.
Who Should Attend?
This course is designed for Cybersecurity specialists, Systems administrators and webmasters.
Prerequisites
1.Laptop for the sessions with Wi-Fi capability 2.Intermediate to expert knowledge of Linux and the command line operations.
Course content
Workshop Resources
| Full Name | Initials (Inst.) | Role | Organization |
|---|---|---|---|
| Nyanjau Kimani | NK | Program Manager | KENET |
| Alfred Kipruto | AK | Quality Assurance | KENET |
| Zeinab Mzungu | ZM | Logistics & Support | KENET |
| Caroline Gachuhi | CG | Registration & Support | KENET |
| Amos Koech | AK | Instructor | KENET |
| Anne Inapat | AI | Instructor | KENET |
| Anne Inapat | AI | Instructor | KENET |
| Anthony Kimani | KA | Instructor | KENET |
| Lilian Maina | LM | Instructor | KENET |
| Kelvin Kariuki | KK | Instructor | MMU |
Participants
| No | Institution | Name | Designation |
TimeTable
| Time | Day 1 (Switching) | Day 2 (IPv6) | Day 3 (Dual-Stack) | Day 4 (Wireless) | Day 5 (Operations) |
|---|---|---|---|---|---|
| **07:00** | **Welcome and registrations** | Sessions start at 08:00 | |||
| **08:00** | **Pre-Training Session (JOINT)** | Day 1 Recap | Day 2 Recap | Day 3 Recap | Day 4 Recap |
| **08:20** | **Housekeeping (JOINT)** | **Module 2:** Security Landscape in IPv4 and IPv6 | **Module 5:** Dual Stack Configuration on Linux | **New Module:** Wi-Fi Security: WPA3, Enterprise Auth (802.1X), and Rogue AP Detection | **Module 8:** Monitoring, Logging and Troubleshooting |
| **09:00** | **Project overview (JOINT)** | **Module 3:** Transitioning to IPv6 – Strategy and Security Considerations | **Module 6:** Publishing and Securing Web, DNS, and Mail Services | **New Module:** 802.1X & Rogue AP Detection | **New Module:** Network Security Audit: Pen-testing your own Campus Infrastructure |
| **10:00** | Tea break | Tea break | Tea break | Tea break | Tea break |
| **10:30** | **New Module:** Campus Network Design: High-Performance Switching | **Module 4:** Dual Stack Concepts & Institutional Planning | **Module 7:** Dual Stack Firewalling and Hardening | **Integrated Module:** eduroam in the Campus Context | **New Module:** Pen-testing (Asset Verification) |
| **13:00** | **Lunch break** | **Lunch break** | **Lunch break** | **Lunch break** | **Lunch break** |
| **14:00** | **New Module:** Layer 2 Security Best Practices | **Lab: IPv6 Implementation** | **Module 7:** (Continued) | **New Module:** Secure Wireless LAN Controllers | **Final Review: Institutional Planning** |
| **15:30** | **Module 1:** Introduction to IP Addressing and Routing | **Review Session** | **Services Lab** | **Wireless Lab** | **Final Assessment** |
| **16:00** | **Tea break** | **Tea break** | **Tea break** | **Tea break** | **Tea break** |
| **16:30** | **Day 1 Recap** | **Day 2 Recap** | **Day 3 Recap** | **Day 4 Recap** | **Final Recap & Closing** |
| **17:00** | **End of Day 1** | **End of Day 2** | **End of Day 3** | **End of Day 4** | **End of Training** |
Feedback Survey