VoIP Security Training

VoIP Security Training

Print Friendly, PDF & Email

Introduction:

VoIP Security Training Course with Intensive Hands-on Labs (Online, Onsite and Classroom Live)

Security is a concern for every company at every level. The wide adoption of VoIP and new protocol standards has introduced many new issues. For most enterprises, the adoption of VoIP is a migration path – a fact that contributes to increased complexity for the IT security personal and network administrators. VoIP introduces new systems, vendors, applications, servers, operating systems, and the like. The introduction of media gateways to handle traditional telephony converted to VoIP on the data network introduces security management challenges on the network.

If not using media gateways, organizations are adopting VoIP providers that carry traffic on an IP network connection. This VoIP security training course will help you understand the issues of VoIP security on all levels of the network. We will follow the OSI model to ensure that all levels are covered. We will begin by learning the technical concepts related to network security. We will then study the protocols such as SIP and H.323 on the IP network. We will conclude with a discussion of the policies and procedures that enhance VoIP security.

Duration: 3 days

RESOURCES:

  • VoIP Security Training Study Guide by Syed A. Ahson, Mohammad Ilyas – Paperback/Barnes & Noble
  • VoIP Security Training Study Guide by by IP3 – Paperback/Amazon
  • VoIP Security Training Study Guide by Ronald Schlager  – Paperback/Kindle – Amazon
  • VoIP Security Study Guide by Syed A. Abson – Paperback/Amazon
  • VoIP Security Study Guide by Jeffrey Beasley – Paperback/eTextbook/Amazon

Related Courses

VoIP Security Training – Customize It:

  • Are you involved with commercial or military deployment planning for VoIP? Depending on your background and job, we can tailor the VoIP security Training course to focus on the technical or managerial issues.
  • Are you a network engineer or administrator who would like to “fill in the holes” and catch up with the state-of-the-art of security planning? Let us know so we can focus the VoIP Security class on the areas that interest you the most.
  • Are you a VoIP network or application installer who would like to learn the security concepts and theory that underlie your craft? We can focus on the tools and techniques that will help you become more “tech savvy” on VoIP security issues.
  • Are you a manager, executive, or sales person whose work involves VoIP security systems? If so, we can emphasize those parts of the VoIP security course that deal with policy management, vendor audits, and procedural security issues.

VoIP Security Training – Audience / Target Group:

The target audience for this VoIP security course:

  • Network security planning teams, network administrators, IT and telecom engineers, and IT security management. This VoIP security Training course is also beneficial for the homeland security community and crime prevention/investigation officers.

VoIP Security Training – Class Prerequisites:

  • VoIP: Protocols, Design, and Implementation Training
  • State-of-the-art of VoIP Technology for Professionals, Managers, and Executives Training

Before taking this VoIP security course, you should have completed either of the two courses listed above or possess equivalent experience.

VoIP Security Training – Objectives:

Upon completing this VoIP security course, learners will be able to meet these objectives:

  • Learn how to evaluate your VoIP security concerns on all levels
  • Understand the key components of the OSI model as they relate to VoIP security planning
  • Discern security vulnerabilities of SIP and other popular VoIP protocols
  • Design for secured network communications by understanding protocol level attack methods
  • Formulate global policies for managing VoIP security

VoIP Security Training – Course Syllabus:

VoIP Security: An Introduction

    • Overview of VoIP security challenges
    • How VoIP relates to overall data security strategy
    • How VoIP relates to traditional telecom security
    • Introduction to the OSI model
    • Learning VoIP security using the OSI model: An introduction
    • VoIP architectural vulnerabilities

Physical Layer Security

    • Cabling and devices
    • Data center and server access, etc.
    • Endpoints

Data Link Layer Security

    • Firewalls and NAT’s
    • DoS Attacks

Transport Layer Security

    • Digest authentication

Session Layer Security

    • Protocols
      • SIP standard and attacks
      • H.323
      • IETF RFC VoIP standards
    • Application-level security vulnerabilities
      • Vendor-specific issues
    • Encryption

Presentation Layer Security

    • Rights and access levels

Application Layer Security

    • Password issues with VoIP and applications
    • User authentication
    • Remote system access issues

Network Security Issues and VoIP

Gateway Security

    • MGCP
    • Megaco/H.248

Network Policies and Security Management

Security Best Practices

    • Security audit methods
    • Vendor management
    • Testing systems and devices: Available tools

Wrap-up: Summary, Q/A, and Evaluations

VoIP Security Training Course Wrap-up

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Time frame:

0