Course Outline
Introduction
Telecom Security Overview
Types of Attacks
Case Study: Hacking the PBX
Telecom Security Assessment
Addressing Network Vulnerabilities
- Tools and techniques
Case Study: Phone Hacking
Network Logical Structure
User Authentication
Physical Equipment
SIP Security
Wireless Network Security Overview
- Secure wireless infrastructure
Case Study: Evil Twin Attacks at Work
Wireless Network Security Testing
- Tools and techniques
Searching for Weaknesses
- Vulnerability Assessment Checklist
Case Study: Wireless DoS Attacks
Encryption
- Implementing WPA2
Wi-Fi Traffic
- Compartmentalizing with VLANs
Physical Security
- Positioning Access Points
- Tracking Rogue 802.11 Devices
Securing Access
- Authentication and authorization
- MAC address access control lists
- Secret keys
WLAN Security
- WIDS/WIPS
Monitoring the Wireless Network
Summary and Conclusion
Requirements
- An understanding of mobile networks.
- An understanding of basic security concepts.
Audience
- Telecom engineers
- Network engineers
- Security professionals
Testimonials (2)
Not standard transfer of knowledge.
Daniel - mikroBIT sp. z o.o.
Course - System and Network Security with FortiGate
Machine Translated
Trainer knows very well the subject. He try to give a lot of examples in order that we understand "how" it is working. He answer to all questions raised. Very available.