Specific vulnerabilities and particular way that Network Equipment Vendors deal with security in the telecom domain.
Also including telco equipment and product security reviews and the fallacy of (some) certification and (many) standardization attempts.
Finally discover how to conduct a practical and fast telecom product security life cycle with automation and open source tools.