VoIP Hacking & Penetration Testing Training
2.7 (19 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
632 students enrolled
Wishlisted Wishlist

Please confirm that you want to add VoIP Hacking & Penetration Testing Training to your Wishlist.

Add to Wishlist

VoIP Hacking & Penetration Testing Training

Learn the art of VoIP Penetration Testing
2.7 (19 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
632 students enrolled
Created by E hacking
Last updated 9/2015
Curiosity Sale
Current price: $10 Original price: $40 Discount: 75% off
30-Day Money-Back Guarantee
  • 6.5 hours on-demand video
  • 1 Article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • You will get the knowledge and skills to create a VoIP network
  • You will learn the art to find vulnerabilities on VoIP networks
  • By the end of this course you will be able to perform real world attacking on VoIP environment
  • You will learn to audit the VoIP security
  • Mastering SIP and its security
View Curriculum
  • Willingness to learn and practice
  • Basic networking and operating system skills

In any environment around the world communication is the key. Previously whole world uses telephone networks as the mode of communication but with the advent of VoIP (Voice over IP) the mode of communication around the world has been changed.

Because of the cost effectiveness of VoIP the organizations are the first one to switch towards it. Now small businesses and household users also switched to VoIP Networks because of its cost effectiveness and good quality,

A major security threat has been created for the growing number of VoIP users around the world day by day. Any organization big or small is using VoIP as the mode of communication. These threats forces the organizations to hire security experts who can find and fix vulnerability but unfortunately experts are not available in the market and few of them charge premium prices.

The objective of this training course is to fill the void by training and creating the experts to test the VoIP security and exploit it. This course will teach you to create/build a VoIP network from the scratch and enables you to perform different attacking vectors during penetration testing process.

Ready to Join us?

Community support will be provided for lifetime, our community is our house full of Infosec professionals and they are willing to help you. Be the part of a big network, we are growing day by day. Other details are mentioned in the course content.

Best of Luck,

Team ehacking

Who is the target audience?
  • Students
  • Network engineers
  • VoIP engineers
  • Ethical hackers
  • Penetration Testers
  • Information Security professional
  • Security analyst
Students Who Viewed This Course Also Viewed
Curriculum For This Course
34 Lectures
Foundation of VoIP Penetration Testing
6 Lectures 46:16

PSTN – Public Switched Telephone Network

OSI Model – Layered Approach

Internet Protocol – Data Network Point of View

TCP/IP An Overview
Voice Over Internet Protocol - VoIP
4 Lectures 41:32
Introduction to VoIP

VoIP Architecture

VoIP Protocols

VoIP Media Protocols
Lab Configuration - VoIP Hacking Environment
9 Lectures 51:12
Asterisk - An Overview

VoIP Servers

Creating a VoIP Server - Trixbox

Creating a VoIP Server - AsteriskNow IP PBX

Trixbox Configuration – Server Setup

AsteriskNow Configuration – Server Setup

Softphone Configuration – Linphone

Softphone Configuration – Zoiper

Download Trixbox & AsteriskNow
Hacking into VoIP Network
14 Lectures 04:15:57
Information Gathering & Enumeration of VoIP Network

Information Gathering & Enumeration Continue

Footprinting – Information Gathering

Footprinting - Information Gathering Continue

User extension Enumeration

VoIP Authentication Cracking – Concept

VoIP Authentication Cracking in Action

Passive Man-in-the-Middle Attack – Concept

Passive Man-in-the-Middle Attack in Action

Active Man-in-the-Middle Attack – Concept

Active Man-in-the-Middle Attack in Action

Registration Hijacking & VoIP Spoofing

Registration Hijacking & VoIP Spoofing Continue

Denial of Server (DOS) Attack – VoIP Network
Beginning of Something Interesting
1 Lecture 01:35
End Note - Let's Start your Journey
About the Instructor
E hacking
3.9 Average rating
229 Reviews
7,774 Students
3 Courses
House of Infosec Professionals

Ehacking is the house of Infosec professionals, we have several years of experience in penetration testing and ethical hacking. The author is a well known VoIP security engineer with over 5 years of experience, the author has also got many certifications and degrees like : Certified Ethical Hacker, RedHat Certified Engineer, CISSP, OSCP, CPE, MBA and BE.

The author has previously published an ebook “Hacking from scratch” and he is also working as a security researcher at Infosec Institute US.

Many security vulnerabilities have also been found on Google, Dailymotion and etc. by the author and the team ehacking. The group and the author are also listed in Soldierx Hacker Database.