Cyber Security in Satellite Communications

Satellite dish

This course provides a focused explanation of the critical aspects of cybersecurity within satellite communications. Participants will gain a practical understanding of the challenges posed by the unique space environment and the fundamental principles of securing satellite communication systems.

The course begins with the basics of satellite communications, before proceeding to explain the various protocols in the OSI 7-layer framework and their significance in the context of satellite communications security. It will explain the security layers and domains in satellite communications systems, as well as the potential attacks that target these critical systems.

Participants will also get to be involved in hands-on practical using Wireshark to visualize the different protocols studied in this course and reinforce networking concepts and security practices in a satellite communication environment.

This course is designed for professionals who wish to seek an understanding of cyber security in satellite communications to secure these critical systems against evolving threats.

  • Technical Marketing or Product Managers
  • Cybersecurity professionals
  • Network security engineers
  • Mobile Network Operators
  • Satellite Operators
  • Telecom Regulators
  • Pre-Sales Engineers
  • Product Planners
  • Network Consultants
  • Technical Sales
  • Satellite Engineers
  • Data Analysts
  • Network Operations Engineers
Instructor-led Training
  • Classroom: 4 days
  • LIVE Virtual*: 28 hours
  • A minimum of 6 or more participants are required to commence a company-based LIVE Virtual course
  • LIVE Virtual courses can be conducted for 5 hours or 7 hours daily. Please note that the number of training days will be extended if you opt for 5 hours daily.

19 – 22 May 2025 (Mon – Thu), GMT +08:00
If you are keen on attending the above scheduled course, please register your interest via our course enquiry form.

At the end of the course, participants will be able to:

  • Understand the role of cyber security in satellite communications
  • Gain insights into the vulnerabilities of various OSI layer protocols in satellite communication
  • Assess potential cyber attack vectors within the OSI 7-layer framework
  • Explore the security layers embedded in satellite communication systems
  • Understand the concept of security domains and their application in safeguarding satellite communications
  • Identify the various security attacks targeting satellite communication systems
  • Be familiar with network scanning techniques employed by hackers
  • Implement measures to secure VoIP in satellite communications systems
  • Acquire practical skills in analyzing network traffic and implementing security measures in satellite communication systems
  1. Recap of SATCOM Fundamentals
  • Characteristics of LEO, MEO, GEO Satellites and their Pros and Cons
  • Satellite Frequency Bands and their Pros and Cons
  • Multiplex Schemes: FDMA, TDMA, CDMA, SCPC, MCPC, etc
  • Linear and Circular Polarization
  • Satellite Beams: Global, Regional, Spot Beams, Steerable Beams
  • EIRP and G/T
  • Link Planning: Transmit Power, Antenna Gains, Free Space Loss, Receive Power, etc.
  1. Cyber Security in Space: Challenges Ahead
  • Cyber Threats to Space Systems
  • Common Types of Cyber Threats
  • Integration of Terrestrial and Non-Terrestrial Networks (NTN)
  • SATCOM Architecture
  • Categorization of Security Challenges
  • Satellite to Satellite
  • Satellite to Ground
  • Satellite to User
  • Potential Security Solutions
  1. TCP/IP Fundamentals and Important Protocols
  • Seven Layer Networking Model Vs TCP/IP Suite
  • Encapsulation, Decapsulation and Headers
  • Addressing Mechanisms at Layers 2, 3, 4
  • Layer 2, Layer 3 and Layer 4 Functionalities
  • Switching and Routing Functions
  • Application Layer Protocols (HTTP, FTP, DNS, DHCP, POP, Telnet, SMTP, etc)
  • Transport Layer Protocols (TCP, UDP)
  • 3-Way Handshake Mechanism and Working based on Acknowledgments,
  • TCP Behavior in case of Congestion and Latency,
  • Overcoming TCP Issues in Satellite Communications
  • TCP Acceleration vs Optimization
  • TCP Spoofing and Performance Enhancing Proxies (PEP)
  • UDP Preference for Real-Time Applications
  • TCP and UDP Headers
  • Window Adjustment in TCP
  • Slow Start and Congestion Avoidance Mechanisms
  • Multiple Flavors of TCP: Vanilla, Reno, New Reno, SACK TCP
  • Network Layer Protocols
  • IP Addressing Scheme
  • IPv4 vs IPv6
  • Overview of Routing Protocols
  • Ping and ICMP
  • Data Link Layer Protocols
  • Ethernet, MAC Addresses
  • ARP vs RARP Protocols
  • VLANs and IEEE Standards
  • Spanning Tree Protocol
  • Customer Tag Vs Service Tag
  • Bridging Technologies: Provider Bridging (PB), Provider Backbone Bridging (PBB)
  1. Satellite Communications Security: Layers
  • Physical Layer Security
  • Confidentiality
  • Authentication
  • Availability
  • Cryptography
  • Key Agreement
  1. Security Domains
  • Access Control
  • Authentication
  • Non-Repudiation
  • Data Confidentiality
  • Communications Security
  • Data Integrity
  • Availability
  • Privacy
  1. Types of Security Attacks
  • DoS (Denial-of-Service) Attacks
  • Routing Attacks
  • Hijacking Attacks
  • Jamming Attacks
  • Signaling Storms
  • Resource Theft
  • Configuration Attacks
  • Eavesdropping Attacks
  • Penetration Attacks
  • Insider Attacks
  • User Identity Attacks
  • TCP Level Attacks
  • Man-in-the-Middle Attacks
  • Scanning Attacks
  • Security Key Exposure
  • Privacy Challenges
  1. Space System Threats
  • Tracking and Monitoring Satellites and their Transmissions
  • Electronic Attack (EA) against Space-based Services at the Transmission Site, the Satellite, and the User’s Equipment
  • Physical Attacks against actual Satellites and Spacecraft
  • Use of Space for Adversary Force Enhancement and Adversary Intelligence Preparation of the Battlefield
  • Uplink Jamming
  • Downlink Jamming
  • Satellite Spoofing
  • Space Segment Threats
  • Anti-Satellite Weapons
  • Kinetic Energy Weapons
  • Laser Weapons
  • RF Weapons
  • Interceptor Types
  • Nuclear Threats
  1. Scanning Networks
  • Network Scanning Concepts
  • Network Scanning Tools
  • Scanning Techniques for Host Discovery
  • Network Scanning Countermeasures
  1. Enumeration
  • Enumeration Concepts
  • Techniques for SNMP Enumeration
  • Techniques for LDAP Enumeration
  • Techniques for SMTP and DNS Enumeration
  • Techniques for IPsec, VoIP, RPC, UNIX/Linux, Telnet, FTP, IPv6 Enumeration
  1. VoIP and IPLC Over Satellite
  • Characteristics of VoIP
  • Challenges of VoIP Over Satellite
  • QoS and Traffic Prioritization
  • Compression Techniques
  • Bandwidth Requirement
  • Bit Rate Calculations
  • Transponder Management
  • VoIP Protocols
  • International Private Leased Circuit (IPLC)
  • International Ethernet Private Line (IEPL)
  • Features of IPLC and IEPL
  • VPN Via Satellite
  • Satellite E-Line and EVPL
  1. Networking Workshop – Hands-on
  • Using the Command Mode
  • Practicing FTP commands
  • Practicing IPCONFIG
  • Practicing PING Command
  • Practicing TraceRoute Command
  • Practicing Other Network-related Commands
  1. Wireshark Workshop – Hands-on
  • Understanding the Interface
  • Packet Analysis Features
  • Analyzing Layers 1, 2, 3 and Application Layer
  • Analyzing TCP Segments
  • Analyzing IP Headers
  • Analyzing Frame Headers
  • Troubleshooting with Wireshark

Note: A Certificate of Completion will only be issued upon achieving at least 75% attendance for the course.

Participants must have completed the ‘An Overview of Satellite Communications‘ course before taking this course. This course assumes and builds on participants’ foundational understanding of SATCOM.

Be the first to add a review.

Please, login to leave a review
Enrolled: 0 students
Level: Classroom

Upcoming Classes

You cannot copy content of this page