Course Details
This three-day training program focuses on modern telecom and mobile
systems, with a particular emphasis on IMS (IP Multimedia Subsystem) and
NGN (Next Generation Networks) core networks. Attendees will gain
insight into the evolution of legacy telecom networks into IMS networks,
along with the reuse of IETF-based protocols within the IMS context and
its associated advantages.
Prerequisites include a basic understanding of telecom and network
principles, familiarity with 2G, 3G, OSI network layers, basic telecom
technologies, and Linux. Additionally, attendees should have a laptop
with Kali Linux, Wireshark skills, and a background in IT security.
The training covers various aspects of IMS, including its technologies,
security architecture, specific protocols, network elements, and security
roles. It also explores communication security, tools, network element
vulnerabilities, attack scenarios, and the path to becoming an IMS
network auditor. After completing the training, attendees will have
access to the presenter's slides through the Intralinks Web platform for
one year.
Training Format:
- Online Delivery: P1 Security courses are designed for seamless online learning. Participants can access pre-recorded lectures and course materials through a secure online platform.
- Hands-on Practice: Participants will have access to P1 Cyber Range, allowing them to engage in practical exercises for real-world application.
- Self-Assessment: Each training module is accompanied by self-assessment quizzes, enabling participants to evaluate their understanding and track their progress.
- Expert Support: A 90-minute "Meet the Expert" session provides participants the opportunity to ask questions directly to P1 experienced instructors.
- Certification: Upon successful completion of the final exam, participants will receive a certification recognizing their achievement.
Buy Through us and Receive:
- 10% off the 2G, 3G, and SS7 Mobile Network Security TS-201 course — €2,250 (after discount).
- 3 months free access to Mpirical's Introduction to VoLTE or VoNR course (your choice).
- 3 months free access to Mpirical's NetX.
Live Training
Course Contents
IMS Introduction.
IMS Benefits.
IMS Technologies.
Root of the technology of IMS.
IMS Security Architecture.
IMS-specific Protocols study:
- SIP IETF.
- SIP-I.
- SIP-T.
- Diameter.
Overview of other protocols still used in IMS:
- GTP-C.
- GTP-U.
- GTP v2.
- GTP’.
IMS Network Elements overview and security roles, functions:
- HSS.
- CSCFs: I-CSCF, P-CSCF, S-CSCF.
- BG / BGCF.
- MGCF.
- SGW.
Specific Network Elements in recent version of IMS core networks:
- SDP / SDR.
- PCRF.
Security of the different IMS planes:
- Access.
- Transport.
- Control.
- Application.
IMS Communication security.
Open Source IMS tools.
IMS network element fingerprinting.
Typical attacks on IMS infrastructure.
Role of legacy in IMS security:
- Interconnection with SS7 signaling network element.
- H248.
Vulnerabilities of some Voice over IP protocols:
- SIP-I.
- SIP-T.
- H323.
Analysis of Network Element and vulnerabilities:
- Generic IMS Network Element vulnerabilities.
Diameter security.
Scenario of attack of IMS network:
- Radio-based, subscriber role.
- Infrastructure-based, Transmission or RAN vector.
- Internal-based, attack.