Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
Telecom Security Overview
Types of Attacks
Case Study: Hacking the PBX
Telecom Security Assessment
Addressing Network Vulnerabilities
- Tools and techniques
Case Study: Phone Hacking
Network Logical Structure
User Authentication
Physical Equipment
SIP Security
Wireless Network Security Overview
- Secure wireless infrastructure
Case Study: Evil Twin Attacks at Work
Wireless Network Security Testing
- Tools and techniques
Searching for Weaknesses
- Vulnerability Assessment Checklist
Case Study: Wireless DoS Attacks
Encryption
- Implementing WPA2
Wi-Fi Traffic
- Compartmentalizing with VLANs
Physical Security
- Positioning Access Points
- Tracking Rogue 802.11 Devices
Securing Access
- Authentication and authorization
- MAC address access control lists
- Secret keys
WLAN Security
- WIDS/WIPS
Monitoring the Wireless Network
Summary and Conclusion
Requirements
- An understanding of mobile networks.
- An understanding of basic security concepts.
Audience
- Telecom engineers
- Network engineers
- Security professionals
35 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.