VoIP Security Training Course with real World hands-on labs (Online, Onsite and Classroom Live)
VoIP is becoming one of the most widely deployed protocols because it has the potential to lower telecommunications costs, mainly by reducing corporations' long distance charges, and support applications, like unified communications, that improve employee productivity. Market research firm Infonetics Research Inc. states that worldwide revenue from VoIP equipment rose 54% to $3.9 billion in 2005.
VoIP Security Training course is planned and designed to provide the participants with a detailed technical perspective on VoIP security and its underlying technology and protocol enablers. The VoIP Security course covers specifics on how to properly assess, audit and mitigate your security risks. Common VoIP attacks will be analyzed, discussed and countermeasures provided. All technical aspects of VoIP security including threats and vulnerabilities and protection mechanisms to secure signaling and media will be covered.
Duration: 3 days
- VoIP Security Training Study Guide by Syed A. Ahson, Mohammad Ilyas – Paperback/Barnes & Noble
- VoIP Security Training Study Guide by by IP3 – Paperback/Amazon
- VoIP Security Training Study Guide by Ronald Schlager – Paperback/Kindle – Amazon
- VoIP Security Study Guide by Syed A. Abson – Paperback/Amazon
- VoIP Security Study Guide by Jeffrey Beasley – Paperback/eTextbook/Amazon
- Are you involved with commercial or military deployment planning for VoIP? Depending on your background and job, we can tailor the VoIP security Training course to focus on the technical or managerial issues.
- Are you a network engineer or administrator who would like to “fill in the holes” and catch up with the state-of-the-art of security planning? Let us know so we can focus the VoIP Security class on the areas that interest you the most.
- Are you a VoIP network or application installer who would like to learn the security concepts and theory that underlie your craft? We can focus on the tools and techniques that will help you become more “tech savvy” on VoIP security issues.
- Are you a manager, executive, or sales person whose work involves VoIP security systems? If so, we can emphasize those parts of the VoIP security course that deal with policy management, vendor audits, and procedural security issues.
VoIP Security Training - Audience / Target Group
The target audience for this VoIP Security course is defined here:
- IT managers
- Network engineers
- Security managers
- IT auditors, project managers
- Security engineers
- Security administrators or any technical professional working with or planning to work with commercial and government based VoIP technologies including: Security professionals, incident handling teams, penetration testers, auditors, network security planning teams, network administrators, IT and telecom engineers, and IT security management.
- This VoIP Security Training course is also beneficial for the homeland security community, DoD and crime prevention/investigation officers.
VoIP Security Training - Objectives:
Upon completing this VoIP security course, learners will be able to meet these objectives:
- Learn how to evaluate your VoIP security concerns on all levels
- Understand the key components of the OSI model as they relate to VoIP security planning
- Discern security vulnerabilities of SIP and other popular VoIP protocols
- Design for secured network communications by understanding protocol level attack methods
- Formulate global policies for managing VoIP security
VoIP Security Training - Course Syllabus:
VoIP Security: An Introduction
- Overview of VoIP security challenges
- How VoIP relates to overall data security strategy
- How VoIP relates to traditional telecom security
- Introduction to the OSI model
- Learning VoIP security using the OSI model: An introduction
- VoIP architectural vulnerabilities
Physical Layer Security
- Cabling and devices
- Data center and server access, etc.
Data Link Layer Security
- Firewalls and NAT’s
- DoS Attacks
Transport Layer Security
- Digest authentication
Session Layer Security
- SIP standard and attacks
- IETF RFC VoIP standards
- Application-level security vulnerabilities
- Vendor-specific issues
Presentation Layer Security
- Rights and access levels
Application Layer Security
- Password issues with VoIP and applications
- User authentication
- Remote system access issues
Network Security Issues and VoIP
Network Policies and Security Management
Security Best Practices
- Security audit methods
- Vendor management
- Testing systems and devices: Available tools
Wrap-up: Summary, Q/A, and Evaluations