Speak to our team now +44 (0)1737 821590

Essential Lawful Intercept

A 1 day training course

Essential Lawful Intercept course description

Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture.

Key outcomes from this course

By the end of the course delegates will be able to:
  • Recognise the legal and regulatory obligations to provide LI and DR.
  • Identify the components of the handover architecture for each of LI and DR.
  • Identify the preferred location of points of interception and points of retention in the IP network.
  • Map intercepted material to handover protocols.
  • Understand the data mapping defined in the available standards for both LI and DR.

Essential Lawful Intercept course details

Who will benefit:
Technical and managerial staff needing to implement public networks.
TCP/IP Foundation.
1 day

Training approach

This structured training course seeks to build upon workbook learning through the use of group exercises, dynamic discussion and individual tasks in order to deliver an engaging and interactive module that will ensure all candidates are able to transfer their new skills into the workplace.

Overall ratings for this course:

Essential Lawful Intercept course contents

What is meant by LI and DR?

Review of regulation: Data protection Directive; Data Retention Directive; RIPA.

LI architectures
Handover and Interception: ETSI standards ES 201 671 and TS 102 232.

LI handover protocol
IRI and CC handover; correlation; manual interfaces.

DR architectures
Handover of query results; points of retention.

DR query command set Retrieval of retained records.

Security concerns
Operation privacy; target privacy; storage and transmission integrity.

Identifying PoI and PoR for provided services.

LI and DR wrap up
Interaction with other services, storage obligations (volume, time, availability).

Why Choose Us

SNT trainers score an average of over 90% on the three main areas of:
  • Ability to teach
  • Technical knowledge
  • Answering questions
“Excellently presented by a very knowledgeable and enthusiastic trainer.” P.D. General Dynamics

We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM

We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.

See Dates & Prices for this course

To enquire about this course

To reserve this course online