Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

Backhaul Security Training

Backhaul Security Training

Backhaul Security Training:

Backhaul Security Training Course (Online, Onsite, and Classroom Live!)

Security and integrity of information from sender to receiver across a network and all of its various components is a complex subject. This Backhaul Security Training course focuses on mitigating vulnerabilities in the physical mobile wireless system as well as the Layer 2 component as L2 frames and their contents travel across the mobile wireless backhaul.

What’s Included?

  • 1 day of  Backhaul Security Training with an expert instructor
  • Backhaul Security Electronic Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee


Related Courses

Customize It:

  • If you are familiar with some aspects of Backhaul Security Training, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Backhaul Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Backhaul Security Training course in a manner understandable to lay audiences


After completing this Backhaul Security course, attendees will be able to:

  • Identify the dependencies of L1 and L2 mobile backhaul security mechanisms and higher-layer security mechanisms
  • Assure the security of information while it is in the mobile backhaul portion of the connection
  • Verify that the mobile backhaul portion of the end-to-end connection is not the weak link in overall information security.

Course Outlines:

Security and Privacy

  • Layer 1 Issues
    • Physical Security
      • POP/CO
      • CoLo
      • Racks / Equipment
      • Power / HVAC
    • Eavesdropping / Signals Intelligence
      • Metallic
      • Fiber
      • Wireless / RF
      • Wireless / Optical
  • Layer 2 Issues
    • Data Link Level Security
    • Client Tunnels
    • Carrier / Service Provider Tunnels
    • Layer 2 Security Mechanism Review
  • Higher Layer and Application Layer Security
  • Encryption
      • Layer 1 (Bulk Encryption)
      • Layer 2
      • Higher Layer
      • Issues
        • Performance
        • Troubleshooting

Top Threats to Mobile Backhaul

  • Threat #1: Physical Service Interruption, HVAC, Power, EMP/HERF
  • Threat #2: Denial of Service (DoS)
  • Threat #3: Eavesdropping / Wireshark / Sniffers
  • Threat #4: Insider Threat
  • Threat #7: Unknown Risk Profile

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame: