Course Outline
Introduction
Telecom Security Overview
Types of Attacks
Case Study: Hacking the PBX
Telecom Security Assessment
Addressing Network Vulnerabilities
- Tools and techniques
Case Study: Phone Hacking
Network Logical Structure
User Authentication
Physical Equipment
SIP Security
Wireless Network Security Overview
- Secure wireless infrastructure
Case Study: Evil Twin Attacks at Work
Wireless Network Security Testing
- Tools and techniques
Searching for Weaknesses
- Vulnerability Assessment Checklist
Case Study: Wireless DoS Attacks
Encryption
- Implementing WPA2
Wi-Fi Traffic
- Compartmentalizing with VLANs
Physical Security
- Positioning Access Points
- Tracking Rogue 802.11 Devices
Securing Access
- Authentication and authorization
- MAC address access control lists
- Secret keys
WLAN Security
- WIDS/WIPS
Monitoring the Wireless Network
Summary and Conclusion
Requirements
- An understanding of mobile networks.
- An understanding of basic security concepts.
Audience
- Telecom engineers
- Network engineers
- Security professionals
Testimonials
Related Courses
AI Awareness for Telecom
14 hoursAI is a collection of technologies for building intelligent systems capable of understanding data and the activities surrounding the data to make "intelligent decisions". For Telecom providers, building applications and services that make
Blockchain for Telecom
7 hoursBlockchain is a technology for building decentralized systems. For Telecom providers, this technology could open the door for improved service offerings in areas such as billing and fraud detection, to name just two. In this instructor-led,
BSS (BUSINESS SUPPORT SYSTEM) for Telecom
21 hoursBSS Course Contents : This course is primarily aimed at managers in Telecom operation who need to have 360 view of a) legacy BSS in eTOM b) emerging BSS in NGOSS c) Billing system including mediation, rating and CDR in details. This course also
Digital Identity for Telecom
21 hoursDigital identity refers to the information used by computer systems to verify user identity. Some issues related to digital identity include e-signatures, access control and fraud detection. This instructor-led, live training (online or onsite)
Deep Learning for Telecom (with Python)
28 hoursMachine learning is a branch of Artificial Intelligence wherein computers have the ability to learn without being explicitly programmed. Deep learning is a subfield of machine learning which uses methods based on learning data representations and
OpenStack for Telecom
14 hoursOpenStack is an open source IaaS (Infrastructure as a Service) software stack. It is popular among Telecom providers who wish to optimize their network stack through Network Functions Virtualization (NFV). This instructor-led, live training
OSS ( Operation Support System ) for Telecom
21 hoursIntroduction: OSS/BSS is at the heart of operation of any Telecom operator. Given growth of Big Data in recent time, area of OSS/BSS has undergone disruptive changes specially with virtualization of the OSS/BSS and given the fact, many of the
PECB Certified Digitalization and Electronic Archiving
35 hoursMaster digitalization and electronic retention/archiving Why should you attend? This course provides all the critical knowledge required to approach, understand, manage and successfully carry out a digitalization and retention/archiving
Network Security
14 hoursSince all applications today heavily rely on communication and networks, there is no application security without network security. This course focuses on network security with a software security viewpoint, and discusses common network attacks
System and Network Security with FortiGate
21 hoursFortiGuard Labs is a security and threat intelligence research company by Fortinet, one of the leading cybersecurity service providers today. Among its most notable products are FortiGate next-generation firewalls (NGFWs) that are more efficient
Network Security in Linux
14 hoursDuring the course, participants will learn: What is denial of service attacks, Flooding, Sniffing, MIM? How to break from the network to the server? How to watch packets on the network (also running on switches)? Do you watch any
Network Security Administrator
35 hoursAudience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
Penetration Testing with Nmap
14 hoursNmap is a port scanner used for penetration and network testing. Port scanners such as Nmap, discover vulnerable communications on computer network systems. This instructor-led, live training (online or onsite) is aimed at software testers who
OpenVAS
14 hoursOpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management. In this instructor-led, live training, participants will learn how to use OpenVAS for network
Palo Alto Firewalls
21 hoursPalo Alto Networks offers a platform that includes advanced firewalls and cloud extension. Palo Alto firewalls prevents malware intrusion with an automated approach that delivers consistent security. This instructor-led, live training (online or