Course Outline
Introduction
Telecom Security Overview
Types of Attacks
Case Study: Hacking the PBX
Telecom Security Assessment
Addressing Network Vulnerabilities
- Tools and techniques
Case Study: Phone Hacking
Network Logical Structure
User Authentication
Physical Equipment
SIP Security
Wireless Network Security Overview
- Secure wireless infrastructure
Case Study: Evil Twin Attacks at Work
Wireless Network Security Testing
- Tools and techniques
Searching for Weaknesses
- Vulnerability Assessment Checklist
Case Study: Wireless DoS Attacks
Encryption
- Implementing WPA2
Wi-Fi Traffic
- Compartmentalizing with VLANs
Physical Security
- Positioning Access Points
- Tracking Rogue 802.11 Devices
Securing Access
- Authentication and authorization
- MAC address access control lists
- Secret keys
WLAN Security
- WIDS/WIPS
Monitoring the Wireless Network
Summary and Conclusion
Requirements
- An understanding of mobile networks.
- An understanding of basic security concepts.
Audience
- Telecom engineers
- Network engineers
- Security professionals
Testimonials (3)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.
Colin Donohue - Technological University of the Shannon: Midlands Midwest
Course - FortiGate 7.4 Administration
Not standard transfer of knowledge.
Daniel - mikroBIT sp. z o.o.
Course - System and Network Security with FortiGate
Machine Translated
**suitable for command**
Tomasz Jaworski - Sad Okregowy w Legnicy
Course - Palo Alto Firewalls
Machine Translated