Backhaul Security Training

Backhaul Security Training

Print Friendly, PDF & Email

Introduction:

Backhaul Security Training Course by ENO

Security and integrity of information from sender to receiver across a network and all of its various components is a complex subject. This Backhaul Security Training course focuses on mitigating vulnerabilities in the physical mobile wireless system as well as the Layer 2 component as L2 frames and their contents travel across the mobile wireless backhaul.

Duration: 1-2 days

Backhaul Security Training
 
Backhaul Security TrainingRelated Courses
 

Customize It:

• If you are familiar with some aspects of Backhaul Security Training, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Backhaul Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Backhaul Security Training course in manner understandable to lay audiences

Objectives:

After completing this Backhaul Security Training course, attendees will be able to:

◾ Identify the dependencies of L1 and L2 mobile backhaul security mechanisms and higher layer security mechanisms
◾ Assure security of information while it is in the mobile backhaul portion of the connection
◾ Verify that the mobile backhaul portion of the end-to-end connection is not the weak link in overall information security.

Backhaul Security Training – Course Outlines:

Security Introduction

◾A high level overview of the topic and the briefing.

Security and Privacy

Layer 1 Issues

◾Physical Security
◾POP/CO
◾CoLo
◾Racks / Equipment
◾Power / HVAC
◾Eavesdropping / Signals Intelligence
◾Metallic
◾Fiber
◾Wireless / RF
◾Wireless / Optical

Layer 2 Issues

◾Data Link Level Security
◾Client Tunnels
◾Carrier / Service Provider Tunnels
◾Layer 2 Security Mechanism Review

Higher Layer and Application Layer Security

Encryption

◾Layer 1 (Bulk Encryption)
◾Layer 2
◾Higher Layer
◾Issues
◾Performance
◾Troubleshooting

Top Threats to Mobile Backhaul

◾Threat #1: Physical Service Interruption, HVAC, Power, EMP/HERF
◾Threat #2: Denial of Service (DoS)
◾Threat #3: Eavesdropping / Wireshark / Sniffers
◾Threat #4: Insider Threat
◾Threat #7: Unknown Risk Profile

Whether you are looking for general information or have a specific question, we want to help!

 
Request More Information

    Time frame:

    0