VoIP Hacking & Penetration Testing Training

Learn the art of VoIP Penetration Testing
3.9 (24 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
586 students enrolled
$19
$40
52% off
Take This Course
  • Lectures 34
  • Length 6.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 2/2015 English

Course Description

In any environment around the world communication is the key. Previously whole world uses telephone networks as the mode of communication but with the advent of VoIP (Voice over IP) the mode of communication around the world has been changed.

Because of the cost effectiveness of VoIP the organizations are the first one to switch towards it. Now small businesses and household users also switched to VoIP Networks because of its cost effectiveness and good quality,

A major security threat has been created for the growing number of VoIP users around the world day by day. Any organization big or small is using VoIP as the mode of communication. These threats forces the organizations to hire security experts who can find and fix vulnerability but unfortunately experts are not available in the market and few of them charge premium prices.

The objective of this training course is to fill the void by training and creating the experts to test the VoIP security and exploit it. This course will teach you to create/build a VoIP network from the scratch and enables you to perform different attacking vectors during penetration testing process.

Ready to Join us?

Community support will be provided for lifetime, our community is our house full of Infosec professionals and they are willing to help you. Be the part of a big network, we are growing day by day. Other details are mentioned in the course content.

Best of Luck,

Team ehacking

What are the requirements?

  • Willingness to learn and practice
  • Basic networking and operating system skills

What am I going to get from this course?

  • You will get the knowledge and skills to create a VoIP network
  • You will learn the art to find vulnerabilities on VoIP networks
  • By the end of this course you will be able to perform real world attacking on VoIP environment
  • You will learn to audit the VoIP security
  • Mastering SIP and its security

What is the target audience?

  • Students
  • Network engineers
  • VoIP engineers
  • Ethical hackers
  • Penetration Testers
  • Information Security professional
  • Security analyst

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Foundation of VoIP Penetration Testing
Course Overview
Preview
05:59
Switching – Packet & Circuit
Preview
09:57
PSTN – Public Switched Telephone Network
06:32
OSI Model – Layered Approach
06:52
Internet Protocol – Data Network Point of View
11:15
TCP/IP An Overview
05:41
Section 2: Voice Over Internet Protocol - VoIP
Introduction to VoIP
07:51
VoIP Architecture
09:42
VoIP Protocols
17:11
VoIP Media Protocols
06:48
Section 3: Lab Configuration - VoIP Hacking Environment
Asterisk - An Overview
03:54
VoIP Servers
08:16
Creating a VoIP Server - Trixbox
05:06
Creating a VoIP Server - AsteriskNow IP PBX
05:19
Trixbox Configuration – Server Setup
11:50
AsteriskNow Configuration – Server Setup
06:37
Softphone Configuration – Linphone
05:36
Softphone Configuration – Zoiper
04:24
Download Trixbox & AsteriskNow
Article
Section 4: Hacking into VoIP Network
Information Gathering & Enumeration of VoIP Network
11:58
Information Gathering & Enumeration Continue
22:57
Footprinting – Information Gathering
17:16
Footprinting - Information Gathering Continue
24:13
User extension Enumeration
07:21
VoIP Authentication Cracking – Concept
13:09
VoIP Authentication Cracking in Action
17:38
Passive Man-in-the-Middle Attack – Concept
13:20
Passive Man-in-the-Middle Attack in Action
26:27
Active Man-in-the-Middle Attack – Concept
13:18
Active Man-in-the-Middle Attack in Action
15:37
Registration Hijacking & VoIP Spoofing
22:41
Registration Hijacking & VoIP Spoofing Continue
18:43
Denial of Server (DOS) Attack – VoIP Network
31:19
Section 5: Beginning of Something Interesting
End Note - Let's Start your Journey
01:35

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

E hacking, House of Infosec Professionals

Ehacking is the house of Infosec professionals, we have several years of experience in penetration testing and ethical hacking. The author is a well known VoIP security engineer with over 5 years of experience, the author has also got many certifications and degrees like : Certified Ethical Hacker, RedHat Certified Engineer, CISSP, OSCP, CPE, MBA and BE.

The author has previously published an ebook “Hacking from scratch” and he is also working as a security researcher at Infosec Institute US.

Many security vulnerabilities have also been found on Google, Dailymotion and etc. by the author and the team ehacking. The group and the author are also listed in Soldierx Hacker Database.


Ready to start learning?
Take This Course