Course Outline
Introduction
Overview of Telecommunications Security
Types of Attacks
Case Study: Hacking the PBX
Telecommunications Security Assessment
Addressing Network Vulnerabilities
- Tools and techniques
Case Study: Phone Hacking
Network Logical Structure
User Authentication
Physical Equipment
SIP Security
Overview of Wireless Network Security
- Securing wireless infrastructure
Case Study: Evil Twin Attacks at Work
Wireless Network Security Testing
- Tools and techniques
Identifying Weaknesses
- Vulnerability Assessment Checklist
Case Study: Wireless Denial of Service (DoS) Attacks
Encryption
- Implementing WPA2
Wi-Fi Traffic Management
- Compartmentalization using VLANs
Physical Security
- Strategic positioning of Access Points
- Tracking Rogue 802.11 Devices
Securing Access
- Authentication and authorization
- MAC address access control lists
- Secret keys
WLAN Security
- WIDS/WIPS
Monitoring the Wireless Network
Summary and Conclusion
Requirements
- A foundational understanding of mobile networks.
- Familiarity with basic security concepts.
Target Audience
- Telecommunications engineers
- Network engineers
- Security professionals
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.