Image

Virtual Classroom Training

€ 2410 *
Image

Classroom
Training

€ 2410 *
Image

Recorded
Training

€ *
Buy now


*Prices exclude VAT

Talk to us about our volume discounts and corporate rates.

[data loading...]

full
18997
Download brochure »
Image

Course outline

[data loading...]

[data loading...]


[data loading...]

[data loading...]

[data loading...]

[data loading...]

Image

[data loading...]

[data loading...]

[data loading...]

[data loading...]

CONTENTS

As telecommunications evolves and becomes increasingly pervasive in society, cybersecurity will need constant vigilance. Security in the era of 5G is going to require continuous assessment and mitigation to ensure that all vulnerabilities and threats are managed proactively.

It is important to that we look at security holistically from local to international, from operations to supply chain and dependencies.

This 3-day course is focused providing tools to understand, assess and mitigate the threats and vulnerabilities within a holistic view as Security is all encompassing.

WHAT MAKES THIS COURSE DIFFERENT?

  • Delegates will have an opportunity to explore the topic by industry expert driven content.
  • Real world case studies and scenarios are used to ensure delegates can practically apply their knowledge
  • Cutting edge information delivered by future thinkers and influencers

WHO SHOULD ATTEND?

RAN, IP and Packet Core Engineers, Planners and Middle Management.

How you will benefit

After this course the delegate will be able to:

  • Understand the different Security Technical components and functions and how they can be applied
  • Explain the technical description of RAN (Radio Access Network) and core network separation regarding security in 5G.
  • Explain the differences of authentication and key management across 2G/3G/4G and 5G.
  • Assess options to secure subscriber’s credentials and authentication.
  • Explain Telco and Hybrid Cloud Security.
  • Evaluate software-defined networking solutions for next generation cellular networks within in the context of securing and managing the control plane.
  • Identify Mobile and Internet Protocol threats.
  • Develop Holistic Security strategies.

How your organisation will benefit

  • Trained engineers equipped with strategies to manage the new Security challenges
  • Digital professionals with expanded knowledge platform
  • Assurance of best practices and compliance.
  • Developed security toolset to integrate into an existing strategy for new technology segments.

PREREQUISITES

Introduction to 5G/LTE and light reading on TCP/IP Protocol- recommended but not essential.

NOTE: This course is not delivered with the FoldOut methodology.

Course outline

Holistic Security technology

  • TCP/IP overview
  • Encapsulation
  • Encryption
  • Role Base Authentication
  • Authentication
  • Authorization
  • Certificates
  • SSH
  • Firewall and zones
  • Log Collection
  • SIEM

5G Security

  • 5G Authentication
  • Concepts of SUPI and SUCI
  • Diameter Security
  • Differences in 2G/3G/4G and 5G
  • Usage of OP/OPc and transport key
  • RAN Security
  • Telco Cloud Considerations
  •  Virtualization Security
  • VNF/CNF security
  • Hardware Secure Modules for Cloud deployments

5G Security Vulnerabilities

  • OTA and eSIM
  • SS7 /Diameter
  • Radio access network
  • Cloud Network
  • Addressing Category Type 1,2,3 threats
  • Fraud Use Case Examples (Sim Swap, Wangiri, Sim Boxes)

5G Security Architecture

  • Holistic Overview
  • Security Strategy
  • Importance of Security Operations Centre
  • Honey Potting
  • DDoS protection Internally and externally
  • Local and International data protection
Assessing, mitigating and understanding security risks in the era of 5G.

Interested in IT Security Holistic Overview?

Please select your interest of delivery format below and fill in the form. We will contact you very soon with further information.


IT Security Holistic Overview