Customer reviews
J. S. Framestore CFC





B. M. London Internet Exchange





SIP security training course contents
SIP review
SIP infrastructure and entities, example SIP session.
Hands on: Simple SIP network with and without authentication.
SIP security attacks
DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity.
Hands on: Basic SIP packet capture, infrastructure attacks.
SIP tools
SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools.
Hands on: Generating SIP packets, rebuilding conversations from captured packets, password cracking.
VPNs and SIP
IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys.
Hands on: SIP calls over IPSec.
Secure SIP signaling
SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures.
Hands on: SIP with TLS.
Secure media streams
SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements.
Hands on: Analysing SRTP packets.
Firewalls
NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls.
Hands on: SIP calls through a firewall.
Why Choose Us
- Ability to teach
- Technical knowledge
- Answering questions
We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…"
M.B. IBM
We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.