Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
Overview of Telecom Security
Types of Attacks
Case Study: Hacking the PBX
Assessing Telecom Security
Addressing Network Vulnerabilities
- Tools and techniques
Case Study: Phone Hacking
Logical Network Structure
User Authentication
Physical Equipment Protection
SIP Security
Overview of Wireless Network Security
- Securing wireless infrastructure
Case Study: Evil Twin Attacks in the Workplace
Testing Wireless Network Security
- Tools and techniques
Identifying Weaknesses
- Vulnerability Assessment Checklist
Case Study: Wireless Denial of Service (DoS) Attacks
Encryption
- Implementing WPA2
Wi-Fi Traffic Management
- Compartmentalization using VLANs
Physical Security
- Strategic Placement of Access Points
- Tracking Rogue 802.11 Devices
Securing Access
- Authentication and authorization
- MAC address access control lists
- Secret keys
WLAN Security
- WIDS/WIPS
Monitoring the Wireless Network
Summary and Conclusion
Requirements
- Understanding of mobile networks.
- Familiarity with basic security concepts.
Target Audience
- Telecom engineers
- Network engineers
- Security professionals
35 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.