VOIP Security Technical Audit Workshop

Course Description

How can I verify that the VOIP products we use are correctly installed, that their security and reliability settings are correctly made, and that they have the security level to meet the needs?

Which software should I use to check the security settings of a Microsoft server?

Who Should Attend

IT auditors, IT security experts, information security experts


Ability to conduct systems audit through hands-on practices and laboratory works on VOIP products audit.

Training Outline

  • VoIP
  • Selection of VoIP protocols
  • Monitoring idle protocols
  • Elements making up the VoIP infrastructure
  • NAT use
  • PBX

Training Duration

1-2 Days