Backhaul Security Training

classroom Live training locations in Canada onsite training virtual training live
Classroom Live Online Live Onsite Training Self-Paced

Backhaul Security Training

Introduction:

Backhaul Security Training Course by ENO

Security and integrity of information from sender to receiver across a network and all of its various components is a complex subject. This Backhaul Security Training course focuses on mitigating vulnerabilities in the physical mobile wireless system as well as the Layer 2 component as L2 frames and their contents travel across the mobile wireless backhaul.

Customize It:

● If you are familiar with some aspects of this course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Related Courses:

Backhaul Standards and Protocols Training
Backhaul Architecture and Implementation Training

Duration: 1-2 days

Objectives:

◾Identify the dependencies of L1 and L2 mobile backhaul security mechanisms and higher layer security mechanisms
◾Assure security of information while it is in the mobile backhaul portion of the connection
◾Verify that the mobile backhaul portion of the end-to-end connection is not the weak link in overall information security.

Course Content:

Security Introduction

◾A high level overview of the topic and the briefing.

Security and Privacy

Layer 1 Issues

◾Physical Security
◾POP/CO
◾CoLo
◾Racks / Equipment
◾Power / HVAC
◾Eavesdropping / Signals Intelligence
◾Metallic
◾Fiber
◾Wireless / RF
◾Wireless / Optical

Layer 2 Issues

◾Data Link Level Security
◾Client Tunnels
◾Carrier / Service Provider Tunnels
◾Layer 2 Security Mechanism Review

Higher Layer and Application Layer Security

Encryption

◾Layer 1 (Bulk Encryption)
◾Layer 2
◾Higher Layer
◾Issues
◾Performance
◾Troubleshooting

Top Threats to Mobile Backhaul

◾Threat #1: Physical Service Interruption, HVAC, Power, EMP/HERF
◾Threat #2: Denial of Service (DoS)
◾Threat #3: Eavesdropping / Wireshark / Sniffers
◾Threat #4: Insider Threat
◾Threat #7: Unknown Risk Profile

Whether you are looking for general information or have a specific question, we want to help

Request More Information

Time Frame: 0-3 Months4-12 Months

Location

If multiple locations, please list in the additional comments field.

On-site
Virtual


Public Training Schedule
Private Group Training

Print Friendly, PDF & Email