VoIP Security Training
VoIP Security Training Course with Hands-On Exercises (Online, Onsite and Classroom Live)
Security is a concern for every company at every level. The wide adoption of VoIP and new protocol standards has introduced many new issues. For most enterprises, the adoption of VoIP is a migration path – a fact that contributes to increased complexity for the IT security personal and network administrators. VoIP introduces new systems, vendors, applications, servers, operating systems, and the like. The introduction of media gateways to handle traditional telephony converted to VoIP on the data network introduces security management challenges on the network.
If not using media gateways, organizations are adopting VoIP providers that carry traffic on an IP network connection. This VoIP security training course will help you understand the issues of VoIP security on all levels of the network. We will follow the OSI model to ensure that all levels are covered. We will begin by learning the technical concepts related to network security. We will then study the protocols such as SIP and H.323 on the IP network. We will conclude with a discussion of the policies and procedures that enhance VoIP security.
Duration: 3 days
RESOURCES
- VoIP Security Training – https://www.wiley.com/
- VoIP Security Training – https://www.packtpub.com/
- VoIP Security Training – https://store.logicaloperations.com/
- VoIP Security Training – https://us.artechhouse.com/
- VoIP Security Training – https://www.amazon.com/
RELATED COURSES
CUSTOMIZE It
- We can adapt this VoIP Security Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this VoIP Security Training course, we can omit or shorten their discussion
- We can adjust the emphasis placed on the various topics or build the VoIP Security Training Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the VoIP Security course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this VoIP Security course:
- Network security planning teams, network administrators, IT and telecom engineers, and IT security management. This VoIP security course is also beneficial for the homeland security community and crime prevention/investigation officers.
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this VoIP Security course are:
- VoIP: Protocols, Design, and Implementation Training
- State-of-the-art of VoIP Technology for Professionals, Managers, and Executives Training
Before taking this VoIP security course, you should have completed either of the two courses listed above or possess equivalent experience.
VoIP Security Training - OBJECTIVES
Upon completing this VoIP security course, learners will be able to meet these objectives:
- Learn how to evaluate your VoIP security concerns on all levels
- Understand the key components of the OSI model as they relate to VoIP security planning
- Discern security vulnerabilities of SIP and other popular VoIP protocols
- Design for secured network communications by understanding protocol level attack methods
- Formulate global policies for managing VoIP security
VoIP Security Training - COURSE SYLLABUS
- VoIP Security: An Introduction
- Overview of VoIP security challenges
- How VoIP relates to overall data security strategy
- How VoIP relates to traditional telecom security
- Introduction to the OSI model
- Learning VoIP security using the OSI model: An introduction
- VoIP architectural vulnerabilities
- Physical Layer Security
- Cabling and devices
- Data center and server access, etc.
- Endpoints
- Data Link Layer Security
- Firewalls and NAT’s
- DoS Attacks
- Transport Layer Security
- Digest authentication
- Session Layer Security
- Protocols
- SIP standard and attacks
- H.323
- IETF RFC VoIP standards
- Application-level security vulnerabilities
- Vendor-specific issues
- Encryption
- Protocols
- Presentation Layer Security
- Rights and access levels
- Application Layer Security
- Password issues with VoIP and applications
- User authentication
- Remote system access issues
- Network Security Issues and VoIP
- Gateway Security
- MGCP
- Megaco/H.248
- Network Policies and Security Management
- Security Best Practices
- Security audit methods
- Vendor management
- Testing systems and devices: Available tools
- Wrap-up: Summary, Q/A, and Evaluations
VoIP Security Training Course Wrap-Up
Whether you are looking for general information or have a specific question, we want to help.
Request More Information