Backhaul Security Training Course by ENO
Security and integrity of information from sender to receiver across a network and all of its various components is a complex subject. This Backhaul Security Training course focuses on mitigating vulnerabilities in the physical mobile wireless system as well as the Layer 2 component as L2 frames and their contents travel across the mobile wireless backhaul.
Duration: 1-2 days
• If you are familiar with some aspects of Backhaul Security Training, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Backhaul Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Backhaul Security Training course in manner understandable to lay audiences
After completing this Backhaul Security Training course, attendees will be able to:
◾ Identify the dependencies of L1 and L2 mobile backhaul security mechanisms and higher layer security mechanisms
◾ Assure security of information while it is in the mobile backhaul portion of the connection
◾ Verify that the mobile backhaul portion of the end-to-end connection is not the weak link in overall information security.
Backhaul Security Training – Course Outlines:
◾A high level overview of the topic and the briefing.
Security and Privacy
Layer 1 Issues
◾Racks / Equipment
◾Power / HVAC
◾Eavesdropping / Signals Intelligence
◾Wireless / RF
◾Wireless / Optical
Layer 2 Issues
◾Data Link Level Security
◾Carrier / Service Provider Tunnels
◾Layer 2 Security Mechanism Review
Higher Layer and Application Layer Security
◾Layer 1 (Bulk Encryption)
Top Threats to Mobile Backhaul
◾Threat #1: Physical Service Interruption, HVAC, Power, EMP/HERF
◾Threat #2: Denial of Service (DoS)
◾Threat #3: Eavesdropping / Wireshark / Sniffers
◾Threat #4: Insider Threat
◾Threat #7: Unknown Risk Profile
Whether you are looking for general information or have a specific question, we want to help!
Request More Information