Chat is disabled at this time.

Cyber Risk to Voice & Data Communications

EmailEmail      PrintPrint

Fee: $1,450.00  

Course Description

This is the third course of a series of courses designed to provide organizational leaders at various levels with sufficient knowledge and skills to drive improvements to their organization's cybersecurity capabilities. This three day course is designed for busy risk managers and other leaders who need to understand the cyber risk to their organization's communications systems, both voice and data.

Topics covered in CYB603 include an overview of networks and network architecture (both wired and wireless), Voice over IP (VoIP), the risks associated with these networks, and how to respond to an incident. In this rapidly changing field, this course is built upon the recently released National Institute of Standards (NIST) cybersecurity framework. (The NIST framework, applies across all industries and organizations, and is currently voluntary.) By completing this training course, participants will understand, value, and apply strategies and policies for safeguarding voice and data communications.

Learn to:
  • Identify historical threats to voice & data communications
  • Identify emerging threats to voice & data communications
  • Given a generalized network topology, recognize the network type and identify network devices, switches, and routers
  • Recognize the function of load balancers
  • Identify types of modems
  • Identify the ways firewalls work
  • Recognize host-based and network-based intrusion detection/prevention systems
  • Given a scenario, identify various policy enforcement points
  • Recognize Internet Protocol (IP) address types
  • Given a scenario, describe how to limit and control network ports, protocols and services
  • Recognize the differences between a physical and a logical network topology
  • Identify the function of Demilitarized Zones (DMZs)
  • Recognize a three-tier architecture
  • Describe the function of Secure Domain Service (DNS)
  • Given a scenario, identify how network redundancy and fault tolerance strategies have been applied
  • Match types of wireless networks with types of wireless attacks
  • Match secure configurations with their correct descriptions
  • Identify how to protect wireless Service Set Identification (SSID)
  • Describe Voice over IP (VoIP) security and privacy issues
  • Given a set of secure configuration and countermeasures, select the best methods for protecting/defending VoIP
  • Recognize security threats for Cloud Computing
  • Given a scenario, identify best risk mitigation strategy for global supply chain threats and vulnerabilities
  • Identify the key elements of configuration management as related to cybersecurity
  • Illustrate the relationship of assets to vulnerabilities to systems to mission impact
  • Describe Continuous Monitoring for voice & data communications systems
  • Given a scenario, identify how to secure and control remote access
  • Identify the use of audit logs
  • Identify Least Privilege access strategies
  • Given a scenario, identify the elements of the incident response strategy

Materials provided include the Cyber Risk To Voice & Data Communications Participant Workbook (©UTA, 2014)

Loading posts...
Sort Gallery

Arrow to top