Cybersecurity for 5G - Threats and Compliance Strategies

The 5G Cybersecurity course is a comprehensive 8-hour training designed to equip cybersecurity professionals, telecom engineers, managers, and governance teams with the knowledge and skills to identify, mitigate, and manage security threats in 5G networks.

Virtual Classroom

€ 1 020

*Prices exclude VAT

CONTENTS

The 5G Cybersecurity course is a comprehensive 8-hour training designed to equip cybersecurity professionals, telecom engineers, managers, and governance teams with the knowledge and skills to identify, mitigate, and manage security threats in 5G networks. The course covers the unique security challenges of 5G technology, explores emerging threats such as virtualization and cloud-native infrastructures, and provides practical guidance on implementing security controls, governance and risk management practices required to maintain a secure and compliant 5G network.

Course Objectives

1. Understanding and Identifying 5G Security Threats

– Understand the unique security challenges of 5G technology, including scalability, virtualization, IoT, low-latency use cases, and network slicing.

– Analyze the evolving 5G threat landscape, including risks related to network function virtualization (NFV), software-defined networking (SDN), and third-party supply chains.

– Identify and model security threats using tools such as threat modeling and risk assessment, particularly in key areas like the RAN, core network, and MEC (Multi-Access Edge Computing).

– Recognize new attack vectors introduced by AI-powered threats and how machine learning can be exploited by attackers.

2. Implementing Security Controls and Best Practices

– Implement industry best practices for securing 5G networks, focusing on the core network, RAN, MEC, and network slicing.

3. Managing and Governing Security in 5G Networks

– Develop governance frameworks for telecom operators, communication service providers (CSP) and 5G vendors, incorporating best practices in security management, compliance, and auditing for 5G networks.

– Comply with global security standards such as 3GPP TS 33.501, GSMA, ETSI, and other regulatory requirements affecting telecom operators.

– Manage ongoing risks and incidents in live 5G networks, creating business continuity and disaster recovery plans tailored to 5G architecture.

– Develop and execute incident response plans, utilizing automated response mechanisms and collaborating with stakeholders across borders to ensure swift resolution of breaches.

–  Conduct security audits and assessments to ensure that the network remains compliant and secure over time, while identifying new vulnerabilities as technology evolves.

NOTE: This course is a subset of the 12-hours course “Cybersecurity for 5G”.

Course outline

Introduction to 5G Technology and Security Framework
  • Overview of 5G Technology: RAN, Core, MEC, network slicing, and IoT integration.
  • Unique Security Challenges in 5G: Scalability, virtualization, IoT, low-latency requirements, and diverse use cases.
  • Introduction to Key Standardization Bodies: 3GPP, ETSI, ITU-T, and their roles in 5G security.
In-Depth Analysis of the 5G Threat Landscape
  • Detailed analysis of threat modeling methods
  • Security risks introduced by network function virtualization (NFV) and software-defined networking (SDN).
  • Risks from third-party vendors, hardware, and software components.
  • Methods on securing the air interface, gNodeB, and managing IoT at scale.
  • Security risks due to distributed architecture at the network edge.
  • Emerging AI-powered threats and the use of AI/ML in defense. Securing Cloud and Containerized Network Functions in 5G
Best Practices for Implementing 5G Security Across Technical Domains
  • Core network security: Encryption, mutual authentication, and securing data flows.
  • RAN security: Securing the radio interface, handovers, and massive IoT deployments.
  • Network slicing: Slice-specific security measures, isolation, and preventing lateral movement.
  • Advanced security measures: AI-powered threat detection, behavioral analytics, balancing security with network performance.
5G Security Governance, Risk Management, and Compliance
  • Governance in 5G Security: Developing governance frameworks for telecom operators¸ CSPs and 5G Vendors.
  • 3GPP TS 33.501: Key security standards and requirements for compliance.
  • Security Audits: Regular audits and assessments to ensure compliance with both standards and internal policies.
  • Risk Management: Developing mitigation strategies and prioritizing risks based on critical assets.
  • Business continuity: Creating business continuity plans tailored to 5G networks.
  • Incident response plans: Automated response mechanisms, cross-border coordination, and collaboration with external stakeholders.

Target Audience

Cybersecurity Professionals: Those working in telecom, critical infrastructure, and technology sectors.

Telecom Operators and Vendors: Engineers and managers responsible for network security.

Regulators and Policymakers: Government and industry professionals involved in setting security standards and policies.