Backhaul Security Training

Backhaul Security Training

Introduction:

Backhaul Security Training Course by Example and Project-Based

This Backhaul Security Training Course focuses on mitigating vulnerabilities in the physical mobile wireless system as well as the Layer 2 component as L2 frames and their contents travel across the mobile wireless backhaul. Security and integrity of information from sender to receiver across a network and all of its various components is a complex subject.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Backhaul Security TrainingRelated Courses:

Duration: 1-2 days

Objectives:

◾Identify the dependencies of L1 and L2 mobile backhaul security mechanisms and higher layer security mechanisms
◾Assure security of information while it is in the mobile backhaul portion of the connection
◾Verify that the mobile backhaul portion of the end-to-end connection is not the weak link in overall information security.

Course Content:

Security Introduction
◾A high level overview of the topic and the briefing.

Security and Privacy

Layer 1 Issues
◾Physical Security
◾POP/CO
◾CoLo
◾Racks / Equipment
◾Power / HVAC
◾Eavesdropping / Signals Intelligence
◾Metallic
◾Fiber
◾Wireless / RF
◾Wireless / Optical

Layer 2 Issues
◾Data Link Level Security
◾Client Tunnels
◾Carrier / Service Provider Tunnels
◾Layer 2 Security Mechanism Review

Higher Layer and Application Layer Security

Encryption
◾Layer 1 (Bulk Encryption)
◾Layer 2
◾Higher Layer
◾Issues
◾Performance
◾Troubleshooting

Top Threats to Mobile Backhaul
◾Threat #1: Physical Service Interruption, HVAC, Power, EMP/HERF
◾Threat #2: Denial of Service (DoS)
◾Threat #3: Eavesdropping / Wireshark / Sniffers
◾Threat #4: Insider Threat
◾Threat #7: Unknown Risk Profile

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment