Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
Overview of Telecom Security
Types of Attacks
Case Study: Hacking the PBX
Telecom Security Assessment
Addressing Network Vulnerabilities
- Tools and techniques
Case Study: Phone Hacking
Network Logical Structure
User Authentication
Physical Equipment
SIP Security
Overview of Wireless Network Security
- Secure wireless infrastructure
Case Study: Evil Twin Attacks in the Workplace
Wireless Network Security Testing
- Tools and techniques
Searching for Weaknesses
- Vulnerability Assessment Checklist
Case Study: Wireless DoS Attacks
Encryption
- Implementing WPA2
Wi-Fi Traffic
- Segmentation using VLANs
Physical Security
- Positioning Access Points
- Tracking Rogue 802.11 Devices
Securing Access
- Authentication and authorisation
- MAC address access control lists
- Secret keys
WLAN Security
- WIDS/WIPS
Monitoring the Wireless Network
Summary and Conclusion
Requirements
- A foundational understanding of mobile networks.
- A grasp of basic security concepts.
Audience
- Telecom engineers
- Network engineers
- Security professionals
35 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.