Cisco CIPT2 6.0: IP Telephony Security

This course is included in our On-demand training solution.


Cisco Unified Communications Manager supports several features that increase the security level of a Cisco Unified Communications solution, including the application of cryptographic features. In order to implement, manage, and troubleshoot a secure Cisco Unified Communications Manager deployment, it is important to understand the underlying cryptographic fundamentals and concepts, and to understand how Cisco Unified Communications Manager cryptographic features rely on a Public Key Infrastructure (PKI) to provide encryption and authentication features. This course describes cryptographic basics and how they are used by Cisco Unified Communications Manager security features. The course also explains how to implement these security features. This course is one of a series from two SkillSoft learning paths, which cover the objectives for Cisco exam 642-456 CIPT2. This exam is one of five required qualifying exams for the CCVP (Cisco Certified Voice Professional) certification.

Target Audience

The primary audience for this learning path will be a range of established IT professionals. They will have a thorough understanding of network and Cisco technology basics, and so good computer literacy along with a solid technical acumen can be assumed; individuals seeking the Implementing Cisco Unified Communications IP Telephony certification and those individuals targeting the Cisco Certified Voice Professional (CCVP) certification.


Working knowledge of converged voice and data networks; working knowledge of MGCP, SIP, and H.323 and their implementation on Cisco IOS gateways; ability to configure and operate Cisco routers and switches; ability to configure and operate Cisco Unified Communications manager in a single site environment; Cisco ICND1 v1.0, Building Cisco Multilayer Switched Networks (BCMSN) v3.0, Cisco Voice Over IP (CVOICE) v6.0, and CIPT1 v6.0.

Expected Duration

180 min.

Course Objectives

Cryptography, Encryption, and Hashing

  • recognize the different types of cryptographic services and distinguish between symmetric and asymmetric encryption.
  • identify the uses of hashing functions.
  • Digital Signatures and PKI

  • identify the benefits and uses of digital signatures and a public key infrastructure (PKI).
  • identify the ways in which a PKI can be used to secure information transfer over the Internet.
  • Security Features Overview

  • identify Cisco Unified Communications Manager’s security and IPSec support features.
  • Signed Phone Loads

  • Recognize the steps for configuring SIP Digest Authentication and SIP Trunk Encryption. |w
  • Issuing Certificates in CUCM

  • identify the different ways of issuing certificates and recognize the uses of the certificate trust list (CTL).
  • identify the way in which certificates are issued and used with secure SRST.
  • PKI Support and CAPF

  • recognize the steps for enabling PKI-based security features.
  • identify the steps for creating locally significant certificates (LSCs) by using Cisco Certificate Authority Proxy Function (CAPF).
  • Signed Files, Encrypted Files, and Secure Signaling

  • identify the steps for configuring encrypted configuration files and TFTP encrypted configuration files.
  • identify the methods by which Cisco Unified Communications Manager implements secure signaling and secure media exchange.
  • Configuring Secure Signaling and Media Transmission

  • identify the steps for configuring secure signaling and media exchange, including secure media transmission to H.323 and MGCP gateways.
  • identify the steps for configuring secure conferencing.
  • Implementing Security