{"id":433,"date":"2019-09-30T05:32:47","date_gmt":"2019-09-30T05:32:47","guid":{"rendered":"http:\/\/dcnds.asia\/?p=433"},"modified":"2020-05-07T04:06:04","modified_gmt":"2020-05-07T04:06:04","slug":"series-2-botnet-mitigation-best-practices-and-system-evaluation-workshop-in-malaysia","status":"publish","type":"post","link":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/series-2-botnet-mitigation-best-practices-and-system-evaluation-workshop-in-malaysia\/","title":{"rendered":"[SERIES 2] BOTNET MITIGATION BEST PRACTICES AND SYSTEM EVALUATION WORKSHOP IN MALAYSIA"},"content":{"rendered":"<p>A two-day workshop on Botnet Monitoring and Mitigation, addressing:<\/p>\n<ul>\n<li>Principles and best practices for botnet detection, monitoring and mitigation<\/li>\n<li>Best practices for dealing with botnets in an IoT environment<\/li>\n<li>Social Engineering and botnet proliferation<\/li>\n<li>Using Cloud Enabled Security System (CESS) for malware detection\/prevention<\/li>\n<li>A discussion forum with invited stakeholders on malware threats<\/li>\n<\/ul>\n<p>This workshop is conducted as part of the Asi@Connect <em>Distributed and Cloud-based Network Defense System for NRENs<\/em> (DCNDS) Project funded by TEIN* Cooperation Center and the European Union to facilitate capacity building among NOC operators and network engineers, as well as security personnel to support the effective operation of Research and Education Networks in the Asian region.<\/p>\n<h3><span style=\"color: #000000;\">Workshop Presentations:<\/span><\/h3>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2019\/12\/1-Nurefsan-Attack-Vectors.pdf\">1-Nurefsan-Attack-Vectors<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2019\/12\/2-Nurefsan-Network-and-Security-Monitoring.pdf\">2-Nurefsan-Network-and-Security-Monitoring<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2019\/12\/3-Nurefsan-Asamoah-Botnet-Monitoring.pdf\">3-Nurefsan-Asamoah-Botnet-Monitoring<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2019\/12\/Dr.-Anbar-Mirai-Botnet.pdf\">Dr. Anbar-Mirai-Botnet<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2019\/12\/Dr.Mustafa-CESS-for-Malware-Detection-Prevention.pdf\">Dr.Mustafa-CESS-for-Malware-Detection-Prevention<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2019\/12\/Dr.Selva-Introduction-Malware-Botnet.pdf\">Dr.Selva-Introduction-Malware-Botnet<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2019\/12\/Forum-Dr.Manmeet-Cybercrime-Perspective-in-Malaysia.pdf\">Forum-Dr.Manmeet-Cybercrime Perspective in Malaysia<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2019\/12\/Prof.Islam-Social_Engineering.pdf\">Prof.Islam-Social_Engineering<\/a><\/p>\n<h3>Target Participants<\/h3>\n<p><span lang=\"EN-GB\">Network and System operators and engineers, as well as Cybersecurity staff from various organisations involved in Malaysian Research &amp; Education Network (MYREN) and other public agencies. Participants are encouraged to bring their own laptops for the Hands-on sessions.<\/span><\/p>\n<h3>Number of Participant Seats<\/h3>\n<p>35 pax<\/p>\n<p><span lang=\"EN-GB\" style=\"color: red;\">The organizers reserve the right to limit the number of participants from each organisation based on available seats.<\/span><\/p>\n<h3>Cost of Participation<\/h3>\n<p><span lang=\"EN-GB\">There are no fees charged to participants for attending the workshop. However, participants will need to make their own arrangements for travel and lodging if needed.<\/span><\/p>\n<h3>Venue<\/h3>\n<p>PPKT Training Room<br \/>\nLevel 2, Eureka Complex<br \/>\nUniversiti Sains Malaysia<br \/>\n11800 Penang, Malaysia<\/p>\n<h3><span style=\"color: #000000;\">Dates<\/span><\/h3>\n<p>Workshop: 20-21 Nov., 2019 (with Social Dinner on night of 21 Nov. 2019)<br \/>\nRegistration: <a href=\"https:\/\/forms.gle\/cJSdBDAnkM3Ejmy86\">Click here<\/a><br \/>\nRegistration Closing Date: <strong><span style=\"color: #ff0000;\">Extended to 01 Nov. 2019<\/span><\/strong><\/p>\n<table style=\"text-align: left; vertical-align: top;\">\n<tbody>\n<tr>\n<td><img loading=\"lazy\" src=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2018\/09\/EU-1.png\" alt=\"\" width=\"150\" height=\"120\"><\/td>\n<td style=\"text-align: left; vertical-align: top;\"><strong><em>This workshop has received funding from Asi@Connect project which is the European Union co-funding project under Grant contract ACA 2016-376-562.<\/em><\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>A two-day workshop on Botnet Monitoring and Mitigation, addressing: Principles and best practices for botnet detection, monitoring and mitigation Best practices for dealing with botnets in an IoT environment Social Engineering and botnet proliferation Using Cloud Enabled Security System (CESS) for malware detection\/prevention A discussion forum with invited stakeholders on malware threats This workshop is conducted as part of the Asi@Connect Distributed and Cloud-based Network Defense System for NRENs (DCNDS) Project funded by TEIN* Cooperation Center and the European Union to facilitate capacity building among NOC operators and network engineers, as well as security personnel to support the effective operation of Research and Education Networks in the Asian region. Workshop Presentations: 1-Nurefsan-Attack-Vectors 2-Nurefsan-Network-and-Security-Monitoring 3-Nurefsan-Asamoah-Botnet-Monitoring Dr. Anbar-Mirai-Botnet Dr.Mustafa-CESS-for-Malware-Detection-Prevention Dr.Selva-Introduction-Malware-Botnet Forum-Dr.Manmeet-Cybercrime Perspective in Malaysia Prof.Islam-Social_Engineering Target Participants Network and System operators and engineers, as well as Cybersecurity staff from various organisations involved in Malaysian Research &amp; Education Network (MYREN) and other public agencies. Participants are encouraged to bring their own laptops for the Hands-on sessions. Number of Participant Seats 35 pax The organizers reserve the right to limit the number of participants from each organisation based on available seats. Cost of Participation There are no fees charged to participants for attending the [&#8230;]<\/p>\n","protected":false},"author":2,"featured_media":534,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/posts\/433"}],"collection":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/comments?post=433"}],"version-history":[{"count":7,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/posts\/433\/revisions"}],"predecessor-version":[{"id":535,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/posts\/433\/revisions\/535"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/media\/534"}],"wp:attachment":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/media?parent=433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/categories?post=433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/tags?post=433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}