Course Outline

Introduction

Telecom Security Overview for Government

Types of Attacks for Government

Case Study: Hacking the PBX for Government

Telecom Security Assessment for Government

  • Tools and techniques for government use

Case Study: Phone Hacking for Government

Network Logical Structure for Government

User Authentication for Government

Physical Equipment for Government

SIP Security for Government

Wireless Network Security Overview for Government

  • Secure wireless infrastructure for government operations

Case Study: Evil Twin Attacks at Work for Government

Wireless Network Security Testing for Government

  • Tools and techniques for government use

Searching for Weaknesses for Government

  • Vulnerability Assessment Checklist for government operations

Case Study: Wireless DoS Attacks for Government

Encryption for Government

  • Implementing WPA2 for government networks

Wi-Fi Traffic Management for Government

  • Compartmentalizing with VLANs for government networks

Physical Security for Government

  • Positioning Access Points for government facilities
  • Tracking Rogue 802.11 Devices for government operations

Securing Access for Government

  • Authentication and authorization for government users
  • MAC address access control lists for government networks
  • Secret keys for government communications

WLAN Security for Government

  • Wireless Intrusion Detection Systems (WIDS)/Wireless Intrusion Prevention Systems (WIPS) for government use

Monitoring the Wireless Network for Government

Summary and Conclusion for Government

Requirements

  • An understanding of mobile networks for government operations.
  • An understanding of basic security concepts for government systems.

Audience

  • Telecom engineers in the public sector
  • Network engineers for government agencies
  • Security professionals within government organizations
 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories