Course Overview:
As VoIP (Voice-over IP) is integrated into the operations of many missions, it is imperative to understand its security ramifications. In the N-595: VoIP Security Analysis and Design class the objectives are designed for those who are chartered with the responsibility of securing networks and application environments that incorporate VoIP. Topics include how VoIP works, its interactions with the network, its vulnerabilities and mitigations. Focus is on leading open source and proprietary technologies utilizing Asterisk and Cisco and the protocols SIP, H.323, RTP, MGCP, and Skinny. Other protocols such as Nortel's UNIStim will be addressed. As for Cisco, security pieces in the VoIP CallManager servers, Catalyst switches, IOS-based routers, and ASA firewalls, amounts to several different platforms, each with its own management interface and lockdown procedures. Various open source tools including those in BackTrack are used for VoIP attacks. A task list of actions for securing enterprise VoIP is carried out in hands-on labs, performed on Cisco phones, routers, switches, and ASA firewalls.
Attendees to N-595: VoIP Security Analysis and Design will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- VoIP Architecture
- VoIP Signaling and media protocols
- Common VoIP authentication mechanisms
- Common VoIP encryption techniques
- VoIP protocol analysis with Wireshark
- Maintaining QoS while mitigating DoS
- VoXML, XML, and application integration security
- Converged network security design and implementation
- Impact of NAT and firewalls
- SIP, H.323, and MGCP vulnerabilities
- VPN, IPsec and SRTP to secure VoIP services
- Penetration testing with open source tools
- Attacks for Eavesdropping, call redirection, and DoS
- Design of hacked firmware virtualization layer
- Concise lockdown steps for network hardware and VoIP
Prerequisites:
- This is an advanced Information Security Course which requires basic Windows & UNIX competency
- Certification or 2 years of experience in these operating systems is highly recommended
- As well as an understanding of TCP/IP
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
Install, configure, and manage Red Hat JBoss Enterprise Application Platform
Red Hat JBoss® Application Administration I teaches you the best practices for installing and configuring Red Hat JBoss Enterprise Application Platform 6. Through hands-on labs, learn the essential, real-world tasks that a system administrator needs to know to effectively deploy and manage applications on JBoss Enterprise Application Platform.
Attendees to RH-345: Red Hat JBoss Application Administration I, will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Overview of JBoss Enterprise Application Platform
- Configure JBoss Enterprise Application Platform in standalone mode
- Configure JBoss Enterprise Application Platform in domain mode
- Configure servers
- Use the CLI tool
- The datasource subsystem
- The logging subsystem
- The messaging subsystem
- The security subsystem
- JVM configuration
- Migrating applications to JBoss Enterprise Application Platform 6
- The web subsystem
Prerequisites:
- Linux System Administration
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The UNIX Security Administrator Prep is a hands-on course that covers how to secure and audit UNIX and Linux operating systems. This includes concepts such as Rootkits, Buffer overflows, and monitoring UNIX/Linux systems.
Attendees to TN-959: Unix Security Administratorwill receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 5 days
Course Objectives:
- AIDE
- Apache
- Best Practices for Kernel Tuning and Warning Banners
- Boot Services
- Chroot()
- DNS- BIND
- DNSSec
- Evidence Collection and Preservation
- Forensic Analysis
- Forensic Preparation and Incident Handling
- Host Based Firewalls – iptables
- Intro to Forensics
- OS Install and Patching
- Physical, User Account, and Password Access Control
- Se Linux
- Sendmail
- SSH
- Stack Smashing
- Sudo
- Syslog-NG
- UNIX Logging
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking, and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: wbcarter
Instructor comments: Good Stuff. Thanks!
User: ryuhas
Instructor comments: Very Good Instructor
Facilities comments: Facilities was great. Location had a lot to be desired. To much traffic and accidents trying to get here.
Liked the class? Then let everyone know!
TechNow has 26 years of courseware deveopment with a huge library of course material. If our standard courses are just not quite right for what you require, we can provide customized training to meet your needs! We have serviced many request for training that is aligned to customer business operations. Additionally, our security related courses can provide concise direction on how to build security programs and/or address gaps in your existing security programs. TechNow strives for 100% customer satisfaction, and customized classes is one method that TechNow uses to achieve that goal.
Together, our Classroom in a Box service and the customized class service can provide highly targeted training to your team at your location.
If you are interested in more information regarding our customized training, contact us at 800-324-2294