Learning Outcome:
Requirement:
Course Curriculum
Foundation of VoIP Penetration Testing
Available in
days
days
after you enroll
Voice Over Internet Protocol - VoIP
Available in
days
days
after you enroll
Lab Configuration - VoIP Hacking Environment
Available in
days
days
after you enroll
-
Start
Asterisk - An Overview
(3:54)
-
Start
VoIP Servers
(8:16)
-
Start
Creating a VoIP Server - Trixbox
(5:06)
-
Start
Creating a VoIP Server - AsteriskNow IP PBX
(5:19)
-
Start
Trixbox Configuration – Server Setup
(23:40)
-
Start
AsteriskNow Configuration – Server Setup
(6:37)
-
Preview
Softphone Configuration – Linphone
(5:36)
-
Start
Softphone Configuration – Zoiper
(4:24)
-
Start
Download Trixbox & AsteriskNow
Foundation of VoIP Penetration Testing
Available in
days
days
after you enroll
Voice Over Internet Protocol - VoIP
Available in
days
days
after you enroll
Lab Configuration - VoIP Hacking Environment
Available in
days
days
after you enroll
-
StartAsterisk - An Overview (3:54)
-
StartVoIP Servers (8:16)
-
StartCreating a VoIP Server - Trixbox (5:06)
-
StartCreating a VoIP Server - AsteriskNow IP PBX (5:19)
-
StartTrixbox Configuration – Server Setup (23:40)
-
StartAsteriskNow Configuration – Server Setup (6:37)
-
PreviewSoftphone Configuration – Linphone (5:36)
-
StartSoftphone Configuration – Zoiper (4:24)
-
StartDownload Trixbox & AsteriskNow
Your Instructor
CIP Cyber
CIP Cyber is an initiative dedicated to protecting critical infrastructure from
cyber threats. Our vision is to empower the cybersecurity community to
defend critical infrastructure, and our mission is to connect, train, and certify
people to protect critical infrastructure.