Backhaul Security Training
Backhaul Security Training Course by Example and Project-Based
This Backhaul Security Training Course focuses on mitigating vulnerabilities in the physical mobile wireless system as well as the Layer 2 component as L2 frames and their contents travel across the mobile wireless backhaul. Security and integrity of information from sender to receiver across a network and all of its various components is a complex subject.
With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.
Duration: 1-2 days
◾Identify the dependencies of L1 and L2 mobile backhaul security mechanisms and higher layer security mechanisms
◾Assure security of information while it is in the mobile backhaul portion of the connection
◾Verify that the mobile backhaul portion of the end-to-end connection is not the weak link in overall information security.
◾A high level overview of the topic and the briefing.
Security and Privacy
Layer 1 Issues
◾Racks / Equipment
◾Power / HVAC
◾Eavesdropping / Signals Intelligence
◾Wireless / RF
◾Wireless / Optical
Layer 2 Issues
◾Data Link Level Security
◾Carrier / Service Provider Tunnels
◾Layer 2 Security Mechanism Review
Higher Layer and Application Layer Security
◾Layer 1 (Bulk Encryption)
Top Threats to Mobile Backhaul
◾Threat #1: Physical Service Interruption, HVAC, Power, EMP/HERF
◾Threat #2: Denial of Service (DoS)
◾Threat #3: Eavesdropping / Wireshark / Sniffers
◾Threat #4: Insider Threat
◾Threat #7: Unknown Risk Profile
Request More Information