Course Outline

Introduction

Telecom Security Overview for Government

Types of Attacks

Case Study: Hacking the PBX

Telecom Security Assessment

Addressing Network Vulnerabilities

  • Tools and techniques

Case Study: Phone Hacking

Network Logical Structure

User Authentication for Government

Physical Equipment

SIP Security

Wireless Network Security Overview

  • Secure wireless infrastructure for government

Case Study: Evil Twin Attacks at Work

Wireless Network Security Testing

  • Tools and techniques

Searching for Weaknesses

  • Vulnerability Assessment Checklist

Case Study: Wireless DoS Attacks

Encryption

  • Implementing WPA2 for government networks

Wi-Fi Traffic

  • Compartmentalizing with VLANs for enhanced security

Physical Security

  • Positioning Access Points strategically
  • Tracking Rogue 802.11 Devices in government environments

Securing Access

  • Authentication and authorization protocols
  • MAC address access control lists for government use
  • Secret keys management

WLAN Security

  • WIDS/WIPS for comprehensive monitoring

Monitoring the Wireless Network for Government Operations

Summary and Conclusion

Requirements

  • An understanding of mobile networks for government.
  • An understanding of basic security concepts.

Audience

  • Telecommunications engineers
  • Network engineers
  • Security professionals
 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories