RSS

Tag Archives: layer 2 security

Interested in UCSEC (Implementing Cisco Unified Communications Security)?

Interested in Cisco’s new course on securing Cisco UC networks, better known as – UCSEC or Implementing Cisco Unified Communications Security?

This course is conducted by various Cisco Learning Partners and focuses on security of Cisco UC network, from an end to end point of view. This course is comprehensive and covers almost all major aspects of Cisco UC security. I haven’t taken the course myself ( I should be teaching it 🙂 ) however, on first impression from table of contents, the course ware will help you understand the topics covered during the ILT course.

However, to gain more insight and build on real world security model – ground up you need a guide and a reference which you can take with you in those grilling sessions with customer and use during design, implementation, consulting, maintenance, or during discovery milestones of the project.

You guessed it right! You need – Securing Cisco IP Telephony Networks which will guide you through various stages of building, deploying, and maintaining a secure Cisco UC solution. This book is your true companion, guide, and reference to learning and implementing Cisco UC Security.

http://www.amazon.com/dp/1587142953

http://www.ciscopress.com/title/9781587142956

So, if you are planning to take UCSEC course, be sure to pick up your copy of Securing Cisco IP Telephony Networks and use it as a reference, as a text, as a guide, and as a companion.

Advertisements
 
16 Comments

Posted by on March 16, 2013 in UC Security Posts

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Understanding Cisco UC Security

Understanding Cisco UC Security

VoIP Security is top of mind concern for CIO’s, IT managers, UC engineers, and security professionals. This video highlights the various potential threats that exist in real world around VoIP networks and the remediation methods, Cisco UC solution defense construct, UC PKI, Security by Deafult (SBD) and much more.

https://supportforums.cisco.com/videos/5584

The video is accompanied by a blog (and you can also download the slide deck for your future reference)

 
4 Comments

Posted by on March 13, 2013 in UC Security Videos

 

Tags: , , , , , , , , , , , , , , , , , , ,

Cisco IP Communicator / IP Phone – Exploiting built-in web server

Here’s a video on how someone rogue can exploit the web server of an IP Phone / Soft Phone installed in your organization and get information about call processing server, TFTP, network information and so on.

CIPC / IP Phone Web Server Exploit – Revealing Ton of Information

To know about more attacks on the same lines and how you can defend your turf, read Cisco Press publication Securing Cisco IP Telephony Networks

 
8 Comments

Posted by on November 16, 2012 in UC Security Videos

 

Tags: , , , , , , , , , , , , ,

Security Cisco IP Telephony Networks – Download Sample Content

Securing Cisco IP Telephony Networks provides an all-in-one reference to Cisco UC, IP Telephony and security professionals as well as decision makers. Here’s your chance to grab two free chapters offered by Cisco Press as sample content from the newly released book.

While Chapter 1 introduces you to the world of Cisco IP Telephony security as well as various threats, business challenges, and so on Chapter 4 gives an insight to a Security Framework around Cisco IP Telephony / Unified Communications which will enable you/your organization to successfully implement the right level of security for Cisco UC applications, underlying network, devices, and so on.

You can access the free content here:

Chapter 1 courtesy Cisco Press

Index and Chapter 4 courtesy Cisco Press

If you enjoyed the free sample chapters, you can buy the eBook or grab a paperback copy @

Cisco Press (Paperback)

Cisco Press (eBook)

Amazon (Paperback)

Amazon (Kindle edition, eBook)

For Indian Subcontinent/AsiaPac readers Infibeam (Paperback)

 
1 Comment

Posted by on November 15, 2012 in UC Security Posts

 

Tags: , , , , , , , , , , , , , , , , , , ,