Learning Objectives

  • Describe the 3 main types of BGP security vulnerabilities.

  • Model the network routing policies of a network within IRR objects

  • Build BGP filters from the IRR for their network operating systems

  • Demonstrate how RPKI’s Route Origin authorisation and validation works

  • Select a specific RPKI implementation model based on a network type.

  • Implement RPKI to address BGP’s route origin validation problem.

Course curriculum

    1. Navigating the Course

    2. Setting the Context

    3. Prerequisite Check

    4. Course Startup Survey

    5. BGP in a Nutshell

    6. BGP Security Vulnerabilities

    1. Internet Routing Registry (IRR) Overview

    2. Components of the Internet Routing Registry (IRR)

    3. Building BGP FIlters from IRR Objects

    4. Mid-course Survey

    1. Public Key Infrastructue (PKI) Overview

    2. Resource Public Key Infrastructure (RPKI)

    3. Implementing RPKI

    1. Final Exam

    2. End of course survey

    3. So what’s next?

About this course

  • Free
  • 16 lessons

Course Lead

Olatunde Awobuluyi