Course curriculum

  1. 1
    • 1. Introduction

    • 2. Background Facts

    • 2 Review - Background Facts

    • 3. Hacking Methods

    • 3 Review - Hacking Methods

    • 4. Risks of Non-Compliance with CPNI and Privacy Rules

    • 4 Review - Risks of Non-Compliance with CPNI and Privacy Rules

    • 5. CPNI and Privacy Rules - Newest Changes

    • 5 Review. CPNI and Privacy Rules - Newest Changes

    • 6. SIM/Device Change or Port Out

    • 6 Review - SIM/Device Change or Port Out

    • 7. Authentication Methods

    • 7 Review - Authentication Methods

    • 8. Security Measures to consider for protecting CPNI

    • 9. Measures of Success - How to know if you're getting it right

    • 9 Review - Measures of Success - How to know if you're getting it right

    • 10. Conclusion and Contact Information