Cademy logoCademy Marketplace

Course Images

Essential Lawful Intercept

Essential Lawful Intercept

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online or In-Person

  • You travel to organiser or they travel to you

  • Redhill

  • Full day

  • All levels

Description

Lawful Intercept training course description

Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture.

What will you learn
  • Recognise the legal and regulatory obligations to provide LI and DR.
  • Identify the components of the handover architecture for each of LI and DR.
  • Identify the preferred location of points of interception and points of retention in the IP network.
  • Map intercepted material to handover protocols.
  • Understand the data mapping defined in the available standards for both LI and DR.
Lawful Intercept training course details
  • Who will benefit:
  • Technical and managerial staff needing to implement public networks.

  • Prerequisites:
  • TCP/IP Foundation

  • Duration
  • 1 day

Lawful Intercept training course contents

  • What is meant by LI and DR?
  • Review of regulation: Data protection Directive; Data Retention Directive; RIPA.

  • LI architectures
  • Handover and Interception: ETSI standards ES 201 671 and TS 102 232.

  • LI handover protocol
  • IRI and CC handover; correlation; manual interfaces.

  • DR architectures
  • Handover of query results; points of retention.

  • DR query command set
  • Retrieval of retained records.

  • Security concerns
  • Operation privacy; target privacy; storage and transmission integrity.

  • Implementation
  • Identifying PoI and PoR for provided services.

  • LI and DR wrap up
  • Interaction with other services, storage obligations (volume, time, availability).

About The Provider

Tags

Reviews