VoIP Security Implementation Training


Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.


I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

Upcoming Dates

Jul 25 - Jul 27, 2022
09:00 - 17:00

Aug 22 - Aug 24, 2022
09:00 - 17:00

Sep 19 - Sep 21, 2022
09:00 - 17:00

Oct 17 - Oct 19, 2022
09:00 - 17:00

Nov 14 - Nov 16, 2022
09:00 - 17:00

Dec 12 - Dec 14, 2022
09:00 - 17:00

VoIP Security Implementation Training
3 days  (Instructor Led Online)  |  ICT Security (Insoft Specials)

Course Details

The VoIP Security Implementation training course provides an overview of advanced Vulnerability Assessment techniques within VoIP. At the end of this course, trainees will be able to plan and realize Vulnerability Assessment sessions, concerning VoIP and SIP/H 323.

Common VoIP attacks will be analyzed, discussed and countermeasures provided. All technical aspects of VoIP security including threats and vulnerabilities and protection mechanisms to secure signaling and media will be covered.


VoIP Security: An Introduction

  • Overview of VoIP security challenges
  • How VoIP relates to overall data security strategy
  • How VoIP relates to traditional telecom security
  • Introduction to the OSI model
  • Learning VoIP security using the OSI model: An introduction
  • VoIP architectural vulnerabilities

Physical Layer Security

  • Cabling and devices
  • Data center and server access, etc.
  • Endpoints

Data Link Layer Security

  • Firewalls and NAT’s
  • DoS Attacks

Transport Layer Security

  • Digest authentication

Session Layer Security

  • Protocols
      • SIP standard and attacks
      • H.323
      • IETF RFC VoIP standards
  • Application-level security vulnerabilities
      • Vendor-specific issues
  • Encryption

Presentation Layer Security

  • Rights and access levels

Application Layer Security

  • Password issues with VoIP and applications
  • User authentication
  • Remote system access issues

Network Security Issues and VoIP

Gateway Security

  • MGCP
  • Megaco/H.248

Network Policies and Security Management

Security Best Practices

  • Security audit methods
  • Vendor management
  • Testing systems and devices: Available tools

Target Audience

  • Network security planning teams, network administrators, IT and telecom engineers, and IT security management.


  • Networking and VoIP networks basic understanding.