Building and Securing VoIP Networks

This course is included in our On-demand training solution.


To identify how to implement numbering plans and scalable dial plans for VoIP networks, calculate existing bandwidth and additional bandwidth requirements for voice and data traffic, and recognize the implications of implementing security measures in IP networks that transport voice

Target Audience

IT professionals responsible for preparing, configuring, and maintaining a voice and data network; candidates preparing for the Cisco Certified Voice Professional certification (CVOICE 642-432)


Working knowledge of LANs, WANs, and IP switching and routing; an understanding of traditional public switched telephone network operations and technologies; internetworking skills covered in the Interconnecting Cisco Network Devices (ICND) course; Cisco Voice Fundamentals (CVF) v1.0 e-learning course completion

Expected Duration

180 min.

Course Objectives

Building and Securing VoIP Networks

  • recognize the advantages and attributes of a hierarchical numbering plan, identify the challenges involved in internal numbering and public numbering plan integration, and recognize the attributes of a scalable dial plan in a VoIP network.
  • identify methods for integrating existing numbering plans into a VoIP network and recognize how VoIP operators can provide mobile user information to 911 services.
  • complete a dial plan and define the numbering ranges for a number plan in a given scenario.
  • identify the factors to be considered when determining the bandwidth requirements of VoIP, and recognize how to calculate bandwidth consumption.
  • calculate the amount of bandwidth per call required to implement a given set of design specifications.
  • recognize sources of traffic statistics and identify network objectives for voice and data traffic.
  • calculate the bandwidth needed by existing data applications and determine the additional voice bandwidth that will be required to implement VoIP.
  • determine the bandwidth requirements for a given connection scenario.
  • identify the elements of a VoIP network security policy and recognize threats to VoIP.
  • recognize how to implement security measures in IP networks that transmit voice.
  • identify the benefits associated with various security components within a given Voice over IP network scenario.