Learning Outcome:
- You will be taught how to conduct voip hacking and penetration testing
- Setting up pentesting environment for Voip
- Complete fundamentals to protect Voip system for an organization
Requirement:
- An interest to become Voip Pentester
Course Curriculum
-
StartAsterisk - An Overview (3:54)
-
StartVoIP Servers (8:16)
-
StartCreating a VoIP Server - Trixbox (5:06)
-
StartCreating a VoIP Server - AsteriskNow IP PBX (5:19)
-
StartTrixbox Configuration – Server Setup (23:40)
-
StartAsteriskNow Configuration – Server Setup (6:37)
-
PreviewSoftphone Configuration – Linphone (5:36)
-
StartSoftphone Configuration – Zoiper (4:24)
-
StartDownload Trixbox & AsteriskNow
Foundation of VoIP Penetration Testing
Available in
days
days
after you enroll
Voice Over Internet Protocol - VoIP
Available in
days
days
after you enroll
Lab Configuration - VoIP Hacking Environment
Available in
days
days
after you enroll
Your Instructor
CIP Cyber
CIP Cyber is an initiative dedicated to protecting critical infrastructure from
cyber threats. Our vision is to empower the cybersecurity community to
defend critical infrastructure, and our mission is to connect, train, and certify
people to protect critical infrastructure.
Reviews

