+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

E-Learning Course: Telecommunications Systems Security

  • Training

  • 6 Hours
  • PTT - Providers of Telecoms Training
  • ID: 4617234

The course begins by explaining the importance of protecting the integrity and confidentiality of personal data. The role and relevance of risk analysis and a security policy are then described.

The course describes ways of protecting communications networks and databases from intrusion and attack. The use of encryption and digital certificates to protect communications is explained. The various forms of malware  are compared and measures to minimise the risk of malware are described.

Finally, the course considers the threats to the availability of telecoms services and potential fraudulent misuse of those services, then describes measures that can be taken to reduce the vulnerability to those threats.

Course prerequisites:

An appreciation of the services offered by telecommunications operators and the structure of the networks that provide such services. It is recommended that the PTT online course TCA: “Telephony and data services” is studied before attempting this security course.

Course objectives:

By the end of this course you will be able to:

  • explain the need to protect information gathered by an organisation about its customers and employees.
  • describe the various types of electronic and social engineering attack that threaten the confidentially of personal data.
  • describe the role and relevance of risk analysis and a security policy.
  • describe the threats to the security of information stored in databases.
  • explain methods of ensuring the confidentially, integrity and availability of transmitted and stored data.
  • explain the factors that have increased the risk of intrusion in modern networks.
  • describe the vulnerabilities of networks attached to the Internet.
  • explain methods of protecting networks and the services they provide from intrusion, denial of service and data theft.
  • explain the obligations and commercial need of telecoms operators to protect their networks and services from possible threats. 
  • describe measures that can be taken to improve the resilience of telecoms systems.
  • give examples of the ways in which criminals may misuse telecoms services for financial gain.
  • explain measures that can be taken to minimise fraud.

Course Content


Module 1: Protecting personal data
Module Aim:
To explain the need to protect information gathered about customers and
employees and describe the role and relevance of risk analysis and a security policy.

By the end of this module, you will be able to:
  • explain the terms confidentiality, privacy, integrity, and availability as applied to the protection of customer data and telecommunications service provision.
  • describe the types of information gathered by telecoms service providers and why such data should be kept secure.
  • describe the various types of electronic and social engineering attack on the confidentially of personal data.
  • describe the motives of attackers and the potential effects of security breaches.
  • explain the security aspects of recruitment and employment termination.
  • describe the role and scope of data protection legislation in Europe.
  • explain the role of risk analysis, security policies, security audits and security certification.
Module 2: Digital security
Module Aim:
Describe the methods of protecting digitally stored and transmitted information against unauthorised access and explain the factors that have increased the risk of intrusion in modern networks.

By the end of this module you will be able to:
  • describe the role and applications of symmetric and asymmetric encryption in the protection of stored and transmitted data.
  • describe the role and applications of Authentication, Authorisation and Accounting in telecoms systems.
  • describe how a man-in-the-middle attack can be used to gain unauthorised
  • access to communications and describe ways of mitigating the risk of such an attack.
  • explain the increased security risk in a competitive, converged and software driven telecoms environment.
  • explain the factors that influence the trustworthiness of a network and the need for protection at the boundaries of a trusted network.
Module 3: Protecting databases
Module Aim:
To describe the threats to the security of information stored in databases and explain methods of ensuring the confidentially, integrity and availability of data.

By the end of this module you will be able to:
  • explain the importance of the management of access to confidential information and telecoms control systems.
  • explain the role of audit trails as part of the management of access to data.
  • explain methods of minimising unauthorised access to online databases including the use of strong passwords, two factor authentication, hashing, and prevention of SQL injection.
  • TCG: “Telecommunications systems security” course syllabus
  • describe how cross site scripting and a man-in-the-browser attack can compromise the security of an online communication.
  • describe the role of the various databases employed in telecommunications systems.
  • explain the importance of managing the disposal of equipment to prevent unauthorised access to data.
  • describe methods of ensuring the availability and integrity of stored data.
Module 4: Internet security
Module Aim:
Describe the vulnerabilities of networks attached to the Internet and explain methods of protecting those networks and the services they provide from intrusion and data theft.

By the end of this module, you will be able to:
  • describe the ways in which malware can affect confidentiality and availability and compare the ways in which the various forms of malware are spread from computer to computer.
  • describe the various methods of avoiding the infiltration of malware into computer networks.
  • describe the various ways apart from malware, that a hacker can employ to gain access to confidential information stored on or communicated over a network.
  • describe methods of protecting networks against intrusion by hackers.
  • describe the role of a security operation centre with reference to intrusion detection and transaction monitoring.
  • describe the purpose of a denial of service attack and explain how such an attack is delivered.
  • explain the various ways in which the disruption caused by a denial of service attack can be minimised
Module 5: Protecting telecommunications services
Module Aim:
To explain the obligations and commercial need of telecoms operators to protect their networks and services from possible threats and describe measures that can be taken to improve resilience and protect revenues against fraud.
By the end of this module, you will be able to:
  • describe the role of the various governmental and industry organisations who have an interest in ensuring the security of telecommunications networks and services.
  • explain the obligations of telecoms service providers to ensure their networks are resilient to physical and electronic threats.
  • give examples of threats that can adversely affect the availability of telecommunications services.
  • explain the obligations of service providers to co-operate with government agencies at times of emergency.
  • give examples of network assets that require special protection and describe the electronic and physical measures that should be taken to protect those assets.
  • describe the use of route, equipment and power diversity to improve the resilience of networks.

Who Should Attend

Target audience:

This online course is aimed at those who have a role to play in reducing the vulnerability of telecommunication systems and databases to security breaches and fraudulent misuse.