SIP Architecture and Security Training
SIP Architecture and Security Training Course with Hands-On Exercises (Online, Onsite and Classroom Live)
Security is a concern for every organization at every level. The introduction of media gateways to handle traditional telephony converted to SIP protocol for VoIP introduces many security management challenges on the data network. If not using media gateways, many organizations are starting to use VoIP providers who carry voice traffic on an IP network connection using the SIP protocol and connect networks using SIP trunking. The widespread adoption of SIP opens potential threats exposing the vulnerabilities of the protocol.
This SIP Architecture and Security Training course will help you understand the issues of network security as they relate to the use of the SIP protocol. We will examine the security vulnerabilities of the protocol as well as each component in a SIP design for a comprehensive review of SIP security issues. We will conclude with a discussion of the policies and procedures that enhance SIP security.
Duration: 3 days
RESOURCES
- SIP Architecture and Security Training – https://www.wiley.com/
- SIP Architecture and Security Training – https://www.packtpub.com/
- SIP Architecture and Security Training – https://store.logicaloperations.com/
- SIP Architecture and Security Training – https://us.artechhouse.com/
- SIP Architecture and Security Training – https://www.amazon.com/
RELATED COURSES
- Session Initiation Protocol Training (SIP)
- IP Multimedia Subsystem (IMS) Training
- Multiprotocol Label Switching Training (MPLS)
CUSTOMIZE It
- We can adapt this SIP Architecture and Security Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this SIP Architecture and Security Training course, we can omit or shorten their discussion
- We can adjust the emphasis placed on the various topics or build the SIP Architecture and Security Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the SIP Architecture and Security course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this SIP Architecture and Security course:
- Network security planning teams, network administrators, IT and telecommunications engineers, IT security management, multimedia applications/services designers and marketing/sales professionals will all benefit from this SIP Architecture and Security Training course. The SIP Security Training course will also be of interest to the Defense, Homeland Security, crime prevention/investigation, and law enforcement community.
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this SIP Architecture and Security course are:
- Basic understanding of TCP/IP protocols and networking concepts.
SIP Architecture and Security Training - OBJECTIVES
Upon completing this SIP Architecture and Security course, learners will be able to meet these objectives:
- Identify the devices, functions and protocols of a SIP network
- Evaluate your SIP security concerns on all levels
- Understand the key components for security planning purposes
- Discern security vulnerabilities of SIP at the protocol layer
- Design for secure network communications by understanding protocol level attack methods
SIP Architecture and Security Training - COURSE SYLLABUS
SIP Basics
- SIP’s place in today’s business and telecommunications marketplace
- Protocol messages and features
- Protocol and how it’s handled on the network
- Elements of a SIP message: Header, RTP stream, and more
- Routing SIP messages
- Call set-up
- Control features supported
SIP Devices and Systems: How Each Element Is Used, Potential Issues, Design and Security Considerations
- Gateways
- Media servers
- Application servers
- Registrars
- Proxy servers
- Load balancers
- End points
- Route plans
SIP and Media Control: An In-depth Discussion of How the Media (Audio, Video, or Messaging) are Handled in SIP for Recording, Conferencing, and Mixed Applications
SIP-T (SIP Trunking)
- Architecture
- Protocol and formats
- Vendor/carrier Issues and variations
SIP Security: An Introduction
- SIP security challenges: An overview
- How SIP security fits into the overall data security strategy
- How SIP security relates to the traditional telecommunications security
- Discussion of the SIP protocol using the OSI model
- SIP’s architectural vulnerabilities
Physical Layer Security: Discussion of Security Factors of SIP Endpoints (Telephones)
- Configuration files
- Tools for loading configuration files
- User access levels
- Other security factors
Data Link Layer Security
- Firewalls and NAT’s
- SIP architecture and potential threats that are handled by the firewall
- Denial of Service (DoS) attacks
- DoS attacks on SIP network components
- DoS risk mitigation
Transport Layer Security: Digest Authentication and SIP
- How it is implemented in the SIP protocol
- How it is used against threats or attacks
Session Layer Security
- Security vulnerabilities of the SIP protocol
- SIP standard and attacks
- IETF and security standards
- Application-level security vulnerabilities
- General
- Vendor-specific issues for the leading vendors
- Encryption issues for SIP
- Encryption as it relates to SIP
- Tradeoff between real-time processing requirements and security
Presentation Layer Security: Rights and Access Levels
Application Layer Security: Load Balancers, Proxy Servers, Media Servers, etc.
- Securing SIP architecture components
- Password issues with SIP and applications
- User authentication
- Remote system access issues
Network Security Issues and SIP
- New vulnerabilities related to SIP messages on the network
- How SIP fits into the current network security plans and designs
Security of Gateways, One of the Most Vulnerable Elements of SIP design
Security Best Practices Related to the SIP Protocol
- Security audit methods
- Vendor management
- Testing systems and devices: Available tools
Wrap-up: Course Recap, Q/A, and Evaluations
SIP Architecture and Security Training Course Wrap-Up
Whether you are looking for general information or have a specific question, we want to help.
Request More Information