Course Outline


Telecom Security Overview

Types of Attacks

Case Study: Hacking the PBX

Telecom Security Assessment

Addressing Network Vulnerabilities

  • Tools and techniques

Case Study: Phone Hacking

Network Logical Structure

User Authentication

Physical Equipment

SIP Security

Wireless Network Security Overview

  • Secure wireless infrastructure

Case Study: Evil Twin Attacks at Work

Wireless Network Security Testing

  • Tools and techniques

Searching for Weaknesses

  • Vulnerability Assessment Checklist

Case Study: Wireless DoS Attacks


  • Implementing WPA2

Wi-Fi Traffic

  • Compartmentalizing with VLANs

Physical Security

  • Positioning Access Points
  • Tracking Rogue 802.11 Devices

Securing Access

  • Authentication and authorization
  • MAC address access control lists
  • Secret keys

WLAN Security


Monitoring the Wireless Network

Summary and Conclusion


  • An understanding of mobile networks.
  • An understanding of basic security concepts.


  • Telecom engineers
  • Network engineers
  • Security professionals
  35 Hours


Related Courses

AI Awareness for Telecom

 14 hours

AI is a collection of technologies for building intelligent systems capable of understanding data and the activities surrounding the data to make "intelligent decisions". For Telecom providers, building applications and services that make

Blockchain for Telecom

 7 hours

Blockchain is a technology for building decentralized systems. For Telecom providers, this technology could open the door for improved service offerings in areas such as billing and fraud detection, to name just two. In this instructor-led,


 21 hours

BSS Course Contents : This course is primarily aimed at managers in Telecom operation who need to have 360 view of a) legacy BSS in eTOM b) emerging BSS in NGOSS c) Billing system including mediation, rating and CDR in details. This course also

Digital Identity for Telecom

 21 hours

Digital identity refers to the information used by computer systems to verify user identity. Some issues related to digital identity include e-signatures, access control and fraud detection. This instructor-led, live training (online or onsite)

Deep Learning for Telecom (with Python)

 28 hours

Machine learning is a branch of Artificial Intelligence wherein computers have the ability to learn without being explicitly programmed. Deep learning is a subfield of machine learning which uses methods based on learning data representations and

OpenStack for Telecom

 14 hours

OpenStack is an open source IaaS (Infrastructure as a Service) software stack. It is  popular among Telecom providers who wish to optimize their network stack through Network Functions Virtualization (NFV). This instructor-led, live training

OSS ( Operation Support System ) for Telecom

 21 hours

Introduction: OSS/BSS is at the heart of operation of any Telecom operator. Given growth of Big Data in recent time, area of OSS/BSS has undergone disruptive changes specially with virtualization of the OSS/BSS and given the fact, many of the

PECB Certified Digitalization and Electronic Archiving

 35 hours

Master digitalization and electronic retention/archiving Why should you attend? This course provides all the critical knowledge required to approach, understand, manage and successfully carry out a digitalization and retention/archiving

Network Security

 14 hours

Since all applications today heavily rely on communication and networks, there is no application security without network security. This course focuses on network security with a software security viewpoint, and discusses common network attacks

System and Network Security with FortiGate

 21 hours

FortiGuard Labs is a security and threat intelligence research company by Fortinet, one of the leading cybersecurity service providers today. Among its most notable products are FortiGate next-generation firewalls (NGFWs) that are more efficient

Network Security in Linux

 14 hours

During the course, participants will learn: What is denial of service attacks, Flooding, Sniffing, MIM? How to break from the network to the server? How to watch packets on the network (also running on switches)? Do you watch any

Network Security Administrator

 35 hours

Audience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.  

Penetration Testing with Nmap

 14 hours

Nmap is a port scanner used for penetration and network testing. Port scanners such as Nmap, discover vulnerable communications on computer network systems. This instructor-led, live training (online or onsite) is aimed at software testers who


 14 hours

OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management. In this instructor-led, live training, participants will learn how to use OpenVAS for network

Palo Alto Firewalls

 21 hours

Palo Alto Networks offers a platform that includes advanced firewalls and cloud extension. Palo Alto firewalls prevents malware intrusion with an automated approach that delivers consistent security. This instructor-led, live training (online or