Course Outline
Introduction
Telecom Security Overview for Government
Types of Attacks for Government
Case Study: Hacking the PBX for Government
Telecom Security Assessment for Government
- Tools and techniques for government use
Case Study: Phone Hacking for Government
Network Logical Structure for Government
User Authentication for Government
Physical Equipment for Government
SIP Security for Government
Wireless Network Security Overview for Government
- Secure wireless infrastructure for government operations
Case Study: Evil Twin Attacks at Work for Government
Wireless Network Security Testing for Government
- Tools and techniques for government use
Searching for Weaknesses for Government
- Vulnerability Assessment Checklist for government operations
Case Study: Wireless DoS Attacks for Government
Encryption for Government
- Implementing WPA2 for government networks
Wi-Fi Traffic Management for Government
- Compartmentalizing with VLANs for government networks
Physical Security for Government
- Positioning Access Points for government facilities
- Tracking Rogue 802.11 Devices for government operations
Securing Access for Government
- Authentication and authorization for government users
- MAC address access control lists for government networks
- Secret keys for government communications
WLAN Security for Government
- Wireless Intrusion Detection Systems (WIDS)/Wireless Intrusion Prevention Systems (WIPS) for government use
Monitoring the Wireless Network for Government
Summary and Conclusion for Government
Requirements
- An understanding of mobile networks for government operations.
- An understanding of basic security concepts for government systems.
Audience
- Telecom engineers in the public sector
- Network engineers for government agencies
- Security professionals within government organizations
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.