Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Conferences > VoIP security tutorial
Go to: HSC Trainings
Télécharger le catalogue des formations
Version française
o Skills & Expertise
o Consulting
o ISO 27001 services
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o Training courses
o E-learning
o Agenda
o Past events
o Tutorials
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
o HSC Newsletter
o Bulletin juridique HSC
o Press review
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|VoIP security tutorial  
blah Conferences
See also...
o Training sessions planning
o Voice over IP / Phone over IP
o Location and date
o Organizer and registration
o Goals and public
o Duration
o Speakers
o Agenda

Location and date

Date: 29 November 2007, at Geneva

Context: Tutorial organized by ID Integrated Data SA

Organizer and registration

ID Integrated Data SA
ID Integrated Data SA

Pour les inscriptions, contacter Aurelie Pernet
Mail: Aurelie.Pernet at idsa.ch
Phone: +41 22.879.85.50
29, Chemin de la vendée
CH-1213 Petit-Lancy

Prix : 850 CHF

Goals and public

Based on the experience of the HSC consultants, gathered through several audits and penetration tests on VoIP platforms, the VoIP security tutorial presents the most important points to know in order to manager the security of a VoIP infrastructure.

Abundantly illustrated with examples and demonstrations, done using software freely available (and, thus reproductible by the trainees), the VoIP security course is interactive and allows the discovery of often underrated aspects of the security of such systems.

At the end of this course, the trainees will be able to secure their VoIP architecture, and maintain a good level of security.

People involved in the deployment/planning of a VoIP solution, willing to reduce the risks linked to this technology: IT manager, security manager, network manager, technical project leader, telecom/network engineer, security engineer, network and security administrator, security auditor... Prior knowledge of TCP/IP protocols is necessary.


This tutorial lasts one day; it is taught in French.


  • Guillaume Lehembre
  • Olivier Dembour


  • Introduction

  • Présentation de la VoIP
    • Atouts / Inconvénients
    • Principaux équipementiers
    • Solutions Softphone (Skype, etc.)
    • Codage / Qualité de la voix

  • Protocoles courants dans la VoIP (H.323, SIP, MGCP, Megaco/H.248, RTP)
    • Usages
    • Architecture
    • Filtrage
    • Mécanismes de sécurité
    • Extensions de sécurité
    • Protocoles media transport (RTP, RTCP, RTSP, etc.)

  • Problématiques de sécurité dans la VoIP
    • Risques introduits par la VoIP
    • Exemples de vulnérabilités découvertes
    • Sécurité des équipements de voix
    • Sécurité des terminaux
    • Le chiffrement dans la VoIP

  • Architecture
    • Exemples pratiques
    • QoS

  • Conclusion

Last modified on 18 October 2007 at 09:59:02 CET - webmaster@hsc.fr
Mentions légales - Information on this server - © 1989-2013 Hervé Schauer Consultants