Workshop abstracts

AWS Technical Essentials

Manoj Nair, Amazon

AWS Technical Essentials introduces you to AWS products, services, and common solutions. It provides you with fundamentals to become more proficient in identifying AWS services so that you can make informed decisions about IT solutions based on your business requirements and get started working on AWS.

Course Objectives

This course teaches you how to:

  • Understand basic data center design concepts
  • Recognize terminology and concepts as they relate to the AWS platform and navigate the AWS Management Console
  • Understand the foundational infrastructure services, including Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Amazon Elastic Block Store (EBS), Amazon Simple Storage Service (S3), Auto Scaling, and Elastic Load Balancing (ELB)
  • Understand the security measures AWS provides and key concepts of AWS Identity and Access Management (IAM)
  • Understand AWS database services, including Amazon DynamoDB and Amazon Relational Database Service (RDS)
  • Understand AWS management tools, including Amazon CloudWatch and AWS Trusted Advisor.

Intended Audience

This course is intended for:

  • Individuals responsible for articulating the technical benefits of AWS services to customers
  • Individuals interested in learning how to get started with using AWS
  • SysOps administrators, Solution Architects and developers interested in using AWS services.

Delivery Method

This course is delivered through a mix of instructor-led training (ILT) and hands-on labs.

Hands-On Activity

This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises.

Course Outline

  • Introduction and History of AWS
  • AWS Infrastructure: Compute, Storage, and Networking
  • AWS Security, Identity, and Access Management
  • AWS Databases
  • AWS Management Tools

VMware – NSX Introduction

Bruce Perram, VMware

Gain hands-on experience with Logical Switching, Distributed Logical Routing, Dynamic Routing, Distributed Firewall and Logical Network Services. This lab introduces the core capabilities of VMware NSX in vSphere environments used to enable Network and Security virtualisation

Internet Metering and Visibility

Brett Smith & Donovan Price, F5 Networks

Learn about the power of the full proxy architecture and how it can provide visibility into network and application traffic flows. This workshop will be a combination of hands-on labs and demos showing how BIG-IP Policy Enforcement Manager (PEM) can provide:

• Visibility into network traffic at all layers
• User\Subscriber Identification techniques
• Provide solutions for Metadata retention-Who, What, When, Where
• URL Filtering–User Coaching, Awareness and Security Controls
• Metering and Charging–Quota management (On-net/Off-net etc.)
• Application Classification
• Class of Service using Bandwidth Control techniques

Workshop attendees are required to bring a laptop with a modern browser (Firefox, Chrome, Internet Explorer, Safari) and RDP client.

The Art of Datamovement

Chris Myers and Brett Rosolen, AARNet

Overview:
This workshop will give attendees an overview of the Science DMZ architecture, different implementation models, how Science DMZ can help data intensive research and drive data Intensive research outcomes.
Attendees will learn the data transfer node (DTN) architecture and implementation requirements of these systems.
There will also be a hands on component of high bandwidth network monitoring, and tools that can be used to actively monitor and trouble shoot the Science DMZ environment.
The Science DMZ security and usecases will be discussed.
**BONUS** All attendees will leave the workshop with a 1Gbps fully functioning perfsonar mini server.

Session 1
Science-DMZ

  • What is a Science DMZ.
  • What is the architecture of a science DMZ
  • Why do I need a science DMZ.
  • How do I get a science DMZ.
  • What are the security implication of a science DMZ

Session 2
DTN Server

  • Hardware architecture of a DTN.
  • Tuning of DTN servers.
  • Transfer software implementations.
  • Solution demonstration using the AARNet Benchmarking capability.

Session 3
Testing and Monitoring Hands on
Perfsonar

  • What is it
  • Why is it valuable to me.
  • How do I use it.
  • Now build one.

iPerf

  • What is it
  • Why is it valuable to me.
  • How do I use it.

NUTTCP

  • What is it
  • Why is it valuable to me.
  • How do I use it.

Session 4
Security

  • How is it different.
  • Why is it different.
  • How does this complement existing polices and procedures?

User cases
Examples of current and future user case that require a Science DMZ solution.

AARNet: SDN Openflow Workshop

Glen Turner & Steven Bong, AARNet

This workshop explores Software Defined Networks by implementing two common SDN platforms: the ONOS IP router and the OpenDaylight datacentre network controller. A knowledge of IP routing and Linux systems administration is required. There will be no programming tasks. No prior knowledge of SDN or OpenFlow is required.

Biography

Steven Bong and Glen Turner are network engineering staff at AARNet. They recently designed and deployed AARNet’s components of the research-oriented Wide-area SDN Testbed.

Organisational Engagement: Communicating IT’s Value. Promoting Collaboration Through Effective Communication

Lou Markstrom

Does “the organisation” understand the value that IT brings to the table? Does your IT department know how to communicate to get and hold the attention of the organisation? Are you doing a good job of interacting with the organisation and being recognised for the contribution you make? In a time of increased outsourcing, and tightening budgets, it is even more important than ever to communicate to the organisation what IT can do, and how you can help them

In this session, you will:

  • Understand the role of organisational engagement in your IT organisation
  • Learn how and when to use “formal” and “informal” engagement methods
  • Design & Construct powerful “Outcome-based” messages
  • Add value to every client transaction by focusing on their WIIFMs
  • Learn the 13 essential elements of implementing an engagement strategy

Biography
Lou Markstrom specialises in designing, developing and delivering talent and culture development solutions that drive desired outcomes for his clients. Lou is co-author of “Unleashing The Power of IT: Bringing People, Business, and Technology Together” published by Wiley as part of it’s CIO series. Over the past 25 years, he has provided training, consulting and coaching to over 35,000 executives, business owners, entrepreneurs and individuals. Lou is the Practice Leader for IT Talent and Culture Development at DDLS, one of Australia’s largest training organisations with over 5,000 clients. He writes a monthly article for the on-line edition of CIO magazine and has been inducted into the Stern School of Business Hall of Fame, NYU Entrepreneurship Hall of Fame, Association of Collegiate Entrepreneurs Hall of Fame, American Federation of Martial Arts Hall of Fame, and Action Martial Arts Magazine’s Hall of Fame.

Addressing the application challenges on today’s infrastructure

Rob Tappenden & Chris Gascoigne, Cisco

As application deployment models evolve and modern infrastructure requirements are ever changing. Administrators and infrastructure designers are now being tasked with supporting more diverse and complex platforms consisting of multiple hypervisors, physical servers, object storage and containerised applications. At the same time, lines of business are demanding that IT organisations deliver these highly complex workloads with the agility and automation they’ve come to expect from cloud services.

This workshop will look at and discuss some of the challenges on today’s modern infrastructure requirements. We will deep dive on what can be done to build an open, scalable, automated and programmable infrastructure platforms to provide an agile platform on which to build innovative applications.

Biography

Rob Tappenden is a Technical Solution Architect with the Cisco ANZ Data Centre team, based in Australia. Joining Cisco UK in 1998, Rob has held roles of Systems Engineer and Consulting Systems Engineer covering large financial and enterprise customers with a focus on Data Centre and Metro DWDM solutions. Returning to Cisco ANZ in 2009, he has continued to support customers with diverse technical requirements both in and out of the Data Centre. Rob has also held roles at both customer and partner organisations with over 20 years experience in networking and communications. CCIE# 2951.

Your innovation IP got hacked: How to respond to cybercrime

Brian Hay, Dimension Data

This half day workshop leads you through a real-world scenario of how to respond to cyber incidents.
Imagine… Your institution has been hacked, losing your entire student records and staffing data, including serious allegations of sexual harassment and confidential research IP, and is now being extorted by cyber criminals. The situation is compounded by a national broadcaster that has become aware of the data for sale on the Dark Web, who approaches you for comment before it goes to air at 6pm.

What do you do? And what is the end game for your institution to ensure you are best positioned to manage this type of situation?

Beginning with a short presentation on cybercrime, this workshop will put attendees through their paces, guiding them through multiple stages of responding to the escalating threat, each leg compounding the one before it. The workshop is designed to provoke significant discussions, necessitating critical decisions.

Biography

Brian Hay joined Dimension Data in 2015 as General Manager, Security. He consults with clients to understand their needs, assisting Dimension Data to develop services to meet the full spectrum of clients’ security requirements, including risk management, compliance, technology integration, and training. Brian has a proven record of partnering with industry for innovative solutions, has an extensive media profile, and national recognition, including recipient of McAfee’s international award for combating cybercrime; the Australian Police Medal; and the National AusCERT Award for Individual Excellence in Information Security. Brian was Detective Superintendent at Queensland Police for 35 years, and holds a Masters.


News Archive