EC-Council Certified VoIP Professional Exam Information

ECVP Exam


Credit Towards Certification

Certified VoIP Professional

Exam Details

  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 hours
  • Test Format: Multiple choice
  • Test Delivery:
  • Prometric Prime Online Web site
 
 

Exam Code

The exam code varies when taken at different testing centers.
  • Prometric Prime: 312-78
  • VUE: 312-78
 
 

Skills Measured

The exam 312-78 tests ECVP candidates on the following 21 domains.
  • Introduction to VoIP
  • Analog to Digital Conversions
  • Traditional Voice Telephony Principles
  • VoIP Devices and Cisco Components
  • Configuring VoIP
  • Implementation and Application of VoIP
  • Quality of Service (QoS) of VoIP
  • H.323 Standards
  • SIP and Supporting Protocols
  • Megaco Protocol
  • Resource Reservation Protocol (RSVP)
  • Wireless VoIP
  • Encryption Techniques for VoIP
  • Troubleshooting VoIP Network
  • VoIP Testing and Tools
  • Threats to VoIP Communication Network
  • VoIP Security
  • Logical Segregation of Network Traffic
  • Hardware and Software VoIP Vendors
  • Regulatory Compliance for VoIP
  • VoIP Hacking

ECVP (312-78) EXAM



Introduction to VoIP

  • Discuss the basic concepts of VoIP and their use in various applications
  • Explain the convergence of various technologies in VoIP
  • Describe the architecture of VoIP and its associated components
  • Discuss different VoIP layers and their interaction with TCP/IP layers
  • Explain the concept of Public Switched Telephone Network (PSTN)
  • Discuss the difference between Circuit Switching and Packet Switching Networks
  • List various features of VoIP
  • Describe the different benefits of VoIP
  • Explain the structure of ROI model
  • Discuss the future of VoIP in present scenario

Analog to Digital Conversions

  • Discuss Analog to Digital (A/D) data conversion and the types of converters used
  • Explain the various types of ADC’s (such as Sigma Delta ADC, Successive Approximation, Pipelined ADC, and Flash ADC)
  • Discuss and explain the functioning of ADC’s
  • Explain the technique of Voice Compression and common VoIP CODECS (compression software)
  • Define the concepts of Encryption and Decryption and their use in securing VoIP communications
  • Explain  the process of decompression
  • Discuss the Digital to Analog data conversion

Traditional Voice Telephony Principles

  • Explain the concept of Analog Signaling and their various kinds
  • Discuss the technique of Earth & Magnet (E&M) Signaling and their various types
  • Describe the technique of Dual Pulse Signaling
  • Define the technique of Dual Tone Multi-Frequency Signaling (DTMF) and their calculation method
  • Explain the Analog systems and the components of Analog network in detail
  • List and explain the functioning of basic telephone system operation
  • Explain the technology of Plain Old Telephone Service (POTS)
  • Discuss and explain the technique of Time Division Multiplexing (TDM)
  • Describe the techniques of Call Control Signaling (CCS)
  • Discuss the Signaling System 7 (SS7) standard

VoIP Devices and Cisco Components

  • Describe the basic VoIP equipments
  • Discuss the Analog Telephone Adapters device and their features
  • Explain the Media Gateways and their functions
  • List the benefits of Signaling gateways
  • Explain the functioning of Call Manager
  • Discuss and explain role of the Private Branch eXchange (PBX) in a VoIP implementation
  • Describe the role and functioning of PSTN gateways
  • Discuss  the use of Session Controllers
  • List and explain the various Cisco components

Configuring VoIP

  • Discuss and explain  the Voice Port cabling and their configuration
  • Define the method of configuring Voice Ports
  • Describe the steps for configuring POTS dial-peer
  • Describe the configuring ISDN BRI Voice Ports and steps to configure ISDN BRI into a PBX
  • Discuss H.323 Gateways and commands to configure them
  • Describe the steps to configure a Cisco router to act as an H.323 gatekeeper
  • Discuss the methods of enabling Weighted Fair Queuing
  • Explain the method of configuring the Router

Implementation and Application of VoIP

  • Discuss VoIP implementation and the types of connections used
  • Explain the IP-Enabled PBX method and their features
  • Define the IP Centric LAN method and their advantages/disadvantages of VoIP implementation using IP Centric LAN method
  • Discuss and explain Satellite VoIP and their associated components
  • List the various applications of VoIP  
  • Discuss the various issues of VoIP services
  • Define Skype™ and their associated features
  • Discuss  Skype for Windows® operating system
  • Describe the Skype for Mac® OS X
  • Discuss and explain Skype for Linux
  • Describe the use of Skype for mobile device

Quality of Service (QoS) of VoIP

  • Discuss and explain the issues associated with Quality of Service (QoS)
  • Describe the difference between Quality of Experience (QoE) and QoS
  • Explain the need of QoS in IP transmission and VoIP networks
  • Discuss the various factors affecting quality of voice in VoIP
  • Explain the QoS monitoring and their advantages
  • List the various benefits of QoS protocols and their important models

H.323 Standards

  • Discuss the various VoIP Standards
  • Explain H.323 and their components
  • Describe and discuss  the various H.323 Protocols Suite
  • Discuss the various control protocols of signaling in H.323
  • Explain H.225 suite and their protocol structure with security considerations
  • Discuss and explain  H.225/Q.931 Call Signaling
  • Describe the H.225/Registration Admission Status (RAS) and key RAS messages
  • Discuss and explain  H.235 and their security mechanism and procedure of how H.235 specification interacts with each protocol
  • Explain H.450.1 up to H.450.8

SIP and Supporting Protocols

  • Discuss the Session Initiation Protocol and their components and functions
  • Explain the Session Description Protocol and their specifications
  • Define the Real-time Transport Protocol
  • Discuss Simple Gateway Control Protocol
  • Explain the Session Announcement Protocol
  • Discuss  the Skinny Client Control Protocol and their various operations
  • Define Dynamic Host Configuration Protocol and the various types of packets used within it
  • Discuss the various issues of Hyper Text Transfer Protocol
  • Explain the Simple Network Management Protocol

Megaco Protocol

  • Discuss and explain Media Gateway Control Protocol (MGCP) and the various gateways associated with it
  • Explain the Media Gateway Reference Architecture and their various functions
  • Discuss Per-Call requirements of MGCP
  • Describe the history of Megaco
  • Discuss the Megaco Protocol Design and their structure
  • List the various commands of Megaco
  • Explain Megaco messaging Sequence
  • Discuss  the available Megaco Packages
  • Describe the various scenarios of Call Processing Language and their characteristics

Resource Reservation Protocol (RSVP)

  • Discuss and explain Resource reservation protocol (RSVP) and their message structure
  • Describe various types of RSVP messages
  • Discuss various issues with RSVP operation
  • List the various kind of information in RSVP data payload
  • Discuss  the RSVP quality of service
  • List and explain the various RSVP reservation style
  • Explain the RSVP tunneling
  • Define RSVP traffic control module
  • Discuss the security implications associated with RSVP

Wireless VoIP

  • Describe the overview of VoIP technology
  • Define and discuss Mobile VoIP
  • Explain voice over WLAN (VoWLAN)
  • Define and explain wireless VoIP
  • List the Standards and Protocols for wireless VoIP
  • Discuss and explain wireless VoIP gateways and phones
  • List the various VoIP service vendors
  • Describe the various attacks on wireless VoIP

Encryption Techniques for VoIP

  • Explain the Encryption and their types
  • Define the need of Encryption for VoIP
  • Discuss the methods of encrypting VoIP
  • List the various pros and cons of VoIP
  • Explain the Media Encryption
  • Describe IETF Encryption solutions for VoIP
  • Discuss and explain  S/MIME: Message Authentication
  • Explain  the Transport Layer Security (TLS): Key Exchange and Signaling Packet Security
  • Discuss Secure Real-Time Transfer Protocol (SRTP): Voice or Video Packet Security

Troubleshooting VoIP Network

  • Provide troubleshooting methods for voice ports
  • List the problems, interfaces states and explanations of troubleshooting serial interfaces
  • Describe the various problems and solutions of troubleshooting Dial Plans
  • Discuss and list the various commands of troubleshooting Dial Peers
  • Explain and list the different commands for troubleshooting frame relay problems
  • Describe the various commands for troubleshooting RSVP
  • List commands for troubleshooting MGCP
  • Describe various commands for troubleshooting the RTP
  • Provide tips for troubleshooting RTSP

VoIP Testing and Tools

  • Describe various VoIP test strategies
  • List various VoIP network components for testing
  • Discuss various gateway performance tests in VoIP test suite
  • Explain the penetration and vulnerability testing
  • List and describe several VoIP sniffing tools
  • Demonstrate various VoIP scanning and enumeration tools
  • Illustrate various VoIP packet creation and flooding tools
  • Demonstrate several VoIP fuzzing tools
  • List and explain various VoIP signaling manipulation tools

Threats to VoIP Communication Network

  • Discuss the various VoIP vulnerabilities
  • Explain Denial-of-Service and various attack scenarios
  • Define Eavesdropping and various attack scenarios of eavesdropping
  • Discuss  the techniques of packet spoofing and masquerading
  • Describe the issues of Replay Attacks
  • List the various explains the various attack scenarios of call redirection and hijacking
  • Discuss and explain  the ARP spoofing
  • Explain the various issues of service interception
  • List the various SIP security vulnerabilities

VoIP Security

  • Discuss the issues of VoIP Security
  • Explain the various constituents of VoIP Security
  • List the guidelines to mitigate DoS attacks and securing VoIP
  • Discuss the various issues of security against Replay Attack
  • Explain the various issues for securing H.235 Protocol
  • Describe  the security implementation for HTTP
  • Discuss the security implications for DHCP
  • Describe the various security policies & processes
  • List the guidelines for securing VoIP network

Logical Segregation of Network Traffic

  • Discuss the various logical separation of data
  • Explain  the Virtual LANs
  • Define the Virtual LAN security
  • Discuss and explain the QoS and traffic shaping
  • Describe the methods of NAT and IP addressing  
  • Discuss the NAT and encryption
  • Explain the issues of Firewalls
  • Discuss the VoIP-aware firewall issues
  • Describe the Access Control Lists (ACLs)

Hardware and Software VoIP Vendors

List solutions and services of major VoIP vendors:

  • Alcatel
  • Avaya
  • Nortel
  • Packet8
  • Infotel
  • Pingtel
  • Cisco
  • 3Com
  • Motorola

Regulatory Compliance for VoIP

  • Discuss the need of regulatory compliance for VoIP based organizations
  • Describe the rules of management assessment of internal control
  • Discuss regulatory requirements as defined by Gramm-Leach-Bliley Act
  • Explain HIPAA and their regulatory basics
  • List security standards for the protection of PHI
  • Explain  the communication assistance for the Law Enforcement Act
  • Describe the technical requirements and standards required for regulatory compliance  
  • Discuss the Enhanced 911 and related regulation
  • Describe  the European union regulatory framework

VoIP Hacking

  • Describe the various steps of VoIP hacking
  • Discuss different VoIP attacks such as audio spam, Caller ID spoofing, voice phishing, call hijacking and phone tapping
  • Explain  the footprinting
  • Describe  the WHOIS and DNS analysis
  • List the various steps to perform footprinting
  • Discuss the various objectives and techniques of scanning
  • Explain the methods of Host/Device identification
  • Discuss enumeration and various techniques
  • List steps to Exploit the Network
  • Describe various issues of covering tracks