|   | 1 | = Workshop Agenda = | 
          
          
            |   | 2 |  | 
          
          
            |   | 3 | '''Time Scedule''' | 
          
          
            |   | 4 |  | 
          
          
            |   | 5 | ||session 1||9.00am - 09.55am || | 
          
          
            |   | 6 | ||break    ||9.55am - 10.00am|| | 
          
          
            |   | 7 | ||session 2||10.00am - 10.50am || | 
          
          
            |   | 8 | ||break    ||10.55am - 11.00am|| | 
          
          
            |   | 9 | ||session 3||11.00pm - 11.55am|| | 
          
          
            |   | 10 | ||break    ||11.55am - 12.00pm|| | 
          
          
            |   | 11 | ||session 4||12.00pm - 1.00pm|| | 
          
          
            |   | 12 | '' | 
          
          
            |   | 13 |  | 
          
          
            |   | 14 | *All times are in UTC+5.30 (!Asia/Colombo) timezone | 
          
          
            |   | 15 |  | 
          
          
            |   | 16 |  | 
          
          
            |   | 17 | ||= Session =||= Topic =||= Presentation / Hands-On =|| | 
          
          
            |   | 18 | ||||||||= Day 1 =|| | 
          
          
            |   | 19 | ||||||||= Opening: welcome talk by CEO/LEARN (Dr. Roshan Ragel) =|| | 
          
          
            |   | 20 | ||Session 1||Self Introduction & Intro to Information Security|||| | 
          
          
            |   | 21 | ||Session 2||Intro to Information Security cont.|||| | 
          
          
            |   | 22 | ||Session 3||Role of Law and Enforcement in Preventing and Investigating Cybercrime |||| | 
          
          
            |   | 23 | ||Session 4||Discussion on creating and maintaining IT policies |||| | 
          
          
            |   | 24 | ||||||||= Day 2 =|| | 
          
          
            |   | 25 | ||Session 1 ||SSH/ crypto theory  |||| | 
          
          
            |   | 26 | ||Session 2 || hands-on (SSL,ufw,apache, SSH two way authentication/ multi factor (SMS/OTP/Crypto/password)|||| | 
          
          
            |   | 27 | ||Session 3 ||IDS/IPS theory and installation |||| | 
          
          
            |   | 28 | ||Session 4 ||Installation of common CMS (Joomla/wordpress/drupal) and hardening hands-on|||| | 
          
          
            |   | 29 | ||||||||= Day 3 =|| | 
          
          
            |   | 30 | ||Session 1 ||vulnerability scanning / penetration testing (using kali linux) hand-on  |||| | 
          
          
            |   | 31 | ||Session 2 ||vulnerability scanning / penetration testing ... |||| | 
          
          
            |   | 32 | ||Session 3 ||wireshark analysis |||| | 
          
          
            |   | 33 | ||Session 4 ||Secure Email Theory & hands-on (create key and put it on email clients)|||| | 
          
          
            |   | 34 | ||||||||= Day 4 =|| | 
          
          
            |   | 35 | ||Session 1 ||Network Monitoring|||| | 
          
          
            |   | 36 | ||Session 2 ||Network Monitoring|||| | 
          
          
            |   | 37 | ||Session 3 ||Netflow|||| | 
          
          
            |   | 38 | ||Session 4 ||Netflow|||| | 
          
          
            |   | 39 | ||||||||= Day 5 =|| | 
          
          
            |   | 40 | ||Session 1 ||Perfsonar|||| | 
          
          
            |   | 41 | ||Session 2 ||Netflow Analysis|||| | 
          
          
            |   | 42 | ||Session 3 ||Network Measurements |||| | 
          
          
            |   | 43 | ||Session 4 ||Network Measurements|||| | 
          
          
            |   | 44 | ||||||||= [https://survey.learn.ac.lk/index.php Online Feed Back Form] =|| | 
          
          
            |   | 45 | ||||||||= Closing =|| |