Taking Over Telecom Networks
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore the vulnerabilities and attack vectors in telecom networks through this comprehensive conference talk. Gain insights into the architecture of telecom systems, potential entry points for attackers, and various attack scenarios. Learn about best practices to reduce attack exposure and enhance network security. Delve into a detailed analysis of telecom network vulnerabilities, accompanied by a press release highlighting key findings and an illustrative architecture breakdown.
Syllabus
Intro
Press Release: some highlights
Architecture Illustration
Possible Entry Points
Attack Vectors
Attack Scenario
Best Practices to Reduce Attack Exposure
Taught by
Hack In The Box Security Conference
Related Courses
The Location AdvantageEsri via Independent Secure Android App Development
University of Southampton via FutureLearn Cloud Computing Security
University System of Maryland via edX Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera المدافعون عن حقوق الإنسان
Amnesty International via edX