YoVDO

Taking Over Telecom Networks

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Telecommunications Courses Network Security Courses Risk Mitigation Courses

Course Description

Overview

Explore the vulnerabilities and attack vectors in telecom networks through this comprehensive conference talk. Gain insights into the architecture of telecom systems, potential entry points for attackers, and various attack scenarios. Learn about best practices to reduce attack exposure and enhance network security. Delve into a detailed analysis of telecom network vulnerabilities, accompanied by a press release highlighting key findings and an illustrative architecture breakdown.

Syllabus

Intro
Press Release: some highlights
Architecture Illustration
Possible Entry Points
Attack Vectors
Attack Scenario
Best Practices to Reduce Attack Exposure


Taught by

Hack In The Box Security Conference

Related Courses

Browser Hacking With ANGLE
Hack In The Box Security Conference via YouTube
Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube
Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube
ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube
Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube