VoIP Hacking & Penetration Testing Training

Learn the art of VoIP Penetration Testing
3.3 (26 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
595 students enrolled
62% off
Take This Course
  • Lectures 34
  • Length 6.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 2/2015 English

Course Description

In any environment around the world communication is the key. Previously whole world uses telephone networks as the mode of communication but with the advent of VoIP (Voice over IP) the mode of communication around the world has been changed.

Because of the cost effectiveness of VoIP the organizations are the first one to switch towards it. Now small businesses and household users also switched to VoIP Networks because of its cost effectiveness and good quality,

A major security threat has been created for the growing number of VoIP users around the world day by day. Any organization big or small is using VoIP as the mode of communication. These threats forces the organizations to hire security experts who can find and fix vulnerability but unfortunately experts are not available in the market and few of them charge premium prices.

The objective of this training course is to fill the void by training and creating the experts to test the VoIP security and exploit it. This course will teach you to create/build a VoIP network from the scratch and enables you to perform different attacking vectors during penetration testing process.

Ready to Join us?

Community support will be provided for lifetime, our community is our house full of Infosec professionals and they are willing to help you. Be the part of a big network, we are growing day by day. Other details are mentioned in the course content.

Best of Luck,

Team ehacking

What are the requirements?

  • Willingness to learn and practice
  • Basic networking and operating system skills

What am I going to get from this course?

  • You will get the knowledge and skills to create a VoIP network
  • You will learn the art to find vulnerabilities on VoIP networks
  • By the end of this course you will be able to perform real world attacking on VoIP environment
  • You will learn to audit the VoIP security
  • Mastering SIP and its security

Who is the target audience?

  • Students
  • Network engineers
  • VoIP engineers
  • Ethical hackers
  • Penetration Testers
  • Information Security professional
  • Security analyst

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Foundation of VoIP Penetration Testing
Course Overview
Switching – Packet & Circuit
PSTN – Public Switched Telephone Network
OSI Model – Layered Approach
Internet Protocol – Data Network Point of View
TCP/IP An Overview
Section 2: Voice Over Internet Protocol - VoIP
Introduction to VoIP
VoIP Architecture
VoIP Protocols
VoIP Media Protocols
Section 3: Lab Configuration - VoIP Hacking Environment
Asterisk - An Overview
VoIP Servers
Creating a VoIP Server - Trixbox
Creating a VoIP Server - AsteriskNow IP PBX
Trixbox Configuration – Server Setup
AsteriskNow Configuration – Server Setup
Softphone Configuration – Linphone
Softphone Configuration – Zoiper
Download Trixbox & AsteriskNow
Section 4: Hacking into VoIP Network
Information Gathering & Enumeration of VoIP Network
Information Gathering & Enumeration Continue
Footprinting – Information Gathering
Footprinting - Information Gathering Continue
User extension Enumeration
VoIP Authentication Cracking – Concept
VoIP Authentication Cracking in Action
Passive Man-in-the-Middle Attack – Concept
Passive Man-in-the-Middle Attack in Action
Active Man-in-the-Middle Attack – Concept
Active Man-in-the-Middle Attack in Action
Registration Hijacking & VoIP Spoofing
Registration Hijacking & VoIP Spoofing Continue
Denial of Server (DOS) Attack – VoIP Network
Section 5: Beginning of Something Interesting
End Note - Let's Start your Journey

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

E hacking, House of Infosec Professionals

Ehacking is the house of Infosec professionals, we have several years of experience in penetration testing and ethical hacking. The author is a well known VoIP security engineer with over 5 years of experience, the author has also got many certifications and degrees like : Certified Ethical Hacker, RedHat Certified Engineer, CISSP, OSCP, CPE, MBA and BE.

The author has previously published an ebook “Hacking from scratch” and he is also working as a security researcher at Infosec Institute US.

Many security vulnerabilities have also been found on Google, Dailymotion and etc. by the author and the team ehacking. The group and the author are also listed in Soldierx Hacker Database.

Ready to start learning?
Take This Course