VoIP Security Training

Commitment 2 Days, 7-8 hours a day.
Language English
User Ratings Average User Rating 4.8 See what learners said
Delivery Options Instructor-Led Onsite, Online, and Classroom Live


Security is a concern for every company at every level. The wide adoption of VoIP and new protocol standards has introduced many new issues. For most enterprises, the adoption of VoIP is a migration path – a fact that contributes to increased complexity for IT security personnel and network administrators. VoIP introduces new systems, vendors, applications, servers, operating systems, and the like. The introduction of media gateways to handle traditional telephony converted to VoIP on the data network introduces security management challenges on the network.

If not using media gateways, organizations are adopting VoIP providers that carry traffic on an IP network connection. This VoIP Security Training course will help you understand the issues of VoIP security on all levels of the network. We will follow the OSI model to ensure that all levels are covered. We will begin by learning the technical concepts related to network security. We will then study the protocols such as SIP and H.323 on the IP network. We will conclude with a discussion of the policies and procedures that enhance VoIP security.

  • VoIP Security Workshop: VoIP Security: An Introduction
  • VoIP security Workshop: Physical Layer Security
  • VoIP security Workshop: Data Link Layer Security
  • VoIP security Workshop: Transport Layer Security
  • VoIP security Workshop: Application Layer Security
  • And more…
  • 2 days of VoIP Security Training with an expert instructor
  • VoIP Security Training Electronic Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee



Upon completing this VoIP security training course, learners will be able to meet these objectives:

  • Understand VoIP
  • Learn VoIP security issues
  • Identify VoIP security features
  • Understand the threats and security holes with VoIP call control protocols H.323, SIP, and MGCP
  • Identify SIP Security Features and learn how to configure and administer those features
  • Learn H.323 security issues including Port usage risk, firewall inspection, and NAT configurations
  • Examine VoIP best practices to support risk mitigation
  • Examine VoIP management tools and best practices to support risk mitigation
  • Learn how NAT and Firewalls impact call setup, media streams, latency, and application-level gateway
  • Understand SIP NAT Traversal
  • Examine how to overcome NAT issues using STUN, TURN, and ICE
  • Examine cryptographic protocols, Datagram Transport Layer Security (DTLS) protocol, Secure Real-time Transport Protocol (SRTP) protocol, and Session Description Protocol Security Descriptions (SDES) protocol
  • Are you involved with commercial or military deployment planning for VoIP? Depending on your background and job, we can tailor the VoIP security Training course to focus on technical or managerial issues.
  • Are you a network engineer or administrator who would like to “fill in the holes” and catch up with state-of-the-art of security planning? Let us know so we can focus the VoIP security Training course on the areas that interest you the most.
  • Are you a VoIP network or application installer who would like to learn the security concepts and theories that underlie your craft? We can focus the VoIP security course on the tools and techniques that will help you become more “tech savvy” on VoIP security issues.
  • Are you a manager, executive, or salesperson whose work involves VoIP security systems? If so, we can emphasize those parts of the VoIP security Training course that deal with policy management, vendor audits, and procedural security issues.

The target audience for this VoIP security Training course:

  • Network security planning teams, network administrators, IT and telecom engineers, and IT security management. This VoIP security course is also beneficial for the homeland security community and crime prevention/investigation officers.

Before taking this VoIP Security course, you should have completed either of the two courses listed above or possess equivalent experience.


  • VoIP Security: An Introduction
  • Overview of VoIP security challenges
  • How VoIP relates to overall data security strategy
  • How VoIP relates to traditional telecom security
  • Introduction to the OSI model
  • Learning VoIP security using the OSI model: An introduction
  • VoIP architectural vulnerabilities
  • Physical Layer Security
    • Cabling and devices
    • Data center and server access, etc.
    • Endpoints
  • Data Link Layer Security
    • Firewalls and NAT’s
    • DoS Attacks
  • Transport Layer Security
    • Digest authentication
  • Session Layer Security
    • Protocols
      • SIP standard and attacks
      • H.323
      • IETF RFC VoIP standards
    • Application-level security vulnerabilities
      • Vendor-specific issues
    • Encryption
  • Presentation Layer Security
    • Rights and access levels
  • Application Layer Security
    • Password issues with VoIP and applications
    • User authentication
    • Remote system access issues
  • Network Security Issues and VoIP
  • Gateway Security
    • MGCP
    • Megaco/H.248
  • Network Policies and Security Management
  • Security Best Practices
    • Security audit methods
    • Vendor management
    • Testing systems and devices: Available tools
  • VoIP Security Training Course Wrap-up
VoIP Security TrainingVoIP Security Training Course Wrap-Up


    Are you Human?