Wireless Network and Telecom Network Security培训
Introduction
Telecom Security Overview
Types of Attacks
Case Study: Hacking the PBX
Telecom Security Assessment
Addressing Network Vulnerabilities
Tools and techniques
Case Study: Phone Hacking
Network Logical Structure
User Authentication
Physical Equipment
SIP Security
Wireless Network Security Overview
Secure wireless infrastructure
Case Study: Evil Twin Attacks at Work
Wireless Network Security Testing
Tools and techniques
Searching for Weaknesses
Vulnerability Assessment Checklist
Case Study: Wireless DoS Attacks
Encryption
Implementing WPA2
Wi-Fi Traffic
Compartmentalizing with VLANs
Physical Security
Positioning Access Points
Tracking Rogue 802.11 Devices
Securing Access
Authentication and authorization
MAC address access control lists
Secret keys
WLAN Security
WIDS/WIPS
Monitoring the Wireless Network
Summary and Conclusion