Get in Touch

Course Outline

Introduction

Overview of Telecom Security

Types of Attacks

Case Study: Hacking the PBX

Assessing Telecom Security

Addressing Network Vulnerabilities

  • Tools and techniques

Case Study: Phone Hacking

Logical Network Structure

User Authentication

Physical Equipment Protection

SIP Security

Overview of Wireless Network Security

  • Securing wireless infrastructure

Case Study: Evil Twin Attacks in the Workplace

Testing Wireless Network Security

  • Tools and techniques

Identifying Weaknesses

  • Vulnerability Assessment Checklist

Case Study: Wireless Denial of Service (DoS) Attacks

Encryption

  • Implementing WPA2

Wi-Fi Traffic Management

  • Compartmentalization using VLANs

Physical Security

  • Strategic Placement of Access Points
  • Tracking Rogue 802.11 Devices

Securing Access

  • Authentication and authorization
  • MAC address access control lists
  • Secret keys

WLAN Security

  • WIDS/WIPS

Monitoring the Wireless Network

Summary and Conclusion

Requirements

  • Understanding of mobile networks.
  • Familiarity with basic security concepts.

Target Audience

  • Telecom engineers
  • Network engineers
  • Security professionals
 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories