Course Description
Course Duration: Five Training Days
Course Language: Arabic or English
Include:
Scientific material with TAB
Workshops
Reception and farewell at the airport
Daily lunch
Coffee Break
Introduction
5G has the potential to make the world much more connected. Devices in locations without access to traditional broadband networks can be deployed using 5G network connectivity. Higher speeds, lower latency, and increased capacity also make it a potential option for devices where 4G LTE was not a viable option. However, with this growth in systems connected to 5G networks also comes potential security implications. Businesses deploying 5G-connected devices need security solutions capable of monitoring and securing them against cyber threats.
5G Network Security Training course presents old and new threats, security aspects, requirements, and recommendations from various organizations, and then the new, improved functions and procedures designed to improve the security of the future 5G networks for communication with regular users and a growing number of IoT devices.
The course provides a comprehensive grounding in this expanded set of security requirements and mechanisms used in 5G. We start by considering the 5G architecture in order to better understand the overall security requirements for both the UE and network. We then build on the security architecture of 4G LTE, with relevant modifications and additions required for 5G, before focusing squarely on the additional features and procedures required to secure the 5G Core Network (Service Based Interface).
Objectives
Upon completion of this 5G Network Security Training course the delegate will be able to:
Describe typical mobile access authentication methods
Describe the 5G enablers
Understand the Novel technologies for 5G security
Describe the WBPLSec system model
Describe LiFi technology
Describe Software Defined Monitoring architecture
Understand IoT security requirements
Understand security issues surrounding positioning technologies
Understand customer edge security issues
Understand the security issues within the MVNO environments
Understand security surrounding Mobile Cloud
Who Should Attend?
5G Network Security Training course is designed for:
Engineers, managers and other personnel who have a need to acquire a technical overview of the security environment employed within 5G networks.
It will also be of benefit to those in the wider technical community who have a need to understand the security protocols employed by advanced cellular networks.
Course Outline
unite1:
Introduction to 5G Networks and Systems
5G Communications Overview
Channels and Carriers
Channelization
5G Access Techniques
5G Services
Broadcasting, Mobile and Fixed 5G Service
5G communications systems engineering principals
Service and Performance Requirements
unite2:
5G Network Security
5G-WLAN security
Introduction to WiFi-5G network interoperability
Overview of network architecture for WiFi-5G network interoperability
5G-WiFi security challenges
Security consideration for architectural design of WiFi-5G networks
Introduction to LiFi-5G network interoperability
5G-LiFi security challenges
Security consideration for architectural design of LiFi-5G networks
Safety of 5G network physical infrastructures
Deployment in 5G Networks
Software Defined Security Monitoring in 5G Networks
Existing Monitoring Techniques
unite3:
5G Positioning
Outdoor versus Indoor Positioning Technologies
Passive versus Active Positioning
Overview of 5G Positioning Mechanisms
Main Privacy Concerns
Passive versus Active Positioning Concepts
Physical Layer-based Security Enhancement Mechanisms for Positioning
Enhancing Trustworthiness
unite4:
5G Cloud and Virtual Network Security
Mobile Virtual Network Operators (MVNO) Security
Cloudification of the Network Operators
TaaS Deployment Security
Future Directions
NFV and NFV-based Security Services
5G, NFV and Security
unite5:
MEC in 5G Networks
Security Challenges in 5G Cloud
Legal Framework for Security and Privacy
Security and Privacy Issues in New 5G Technologies
Relevance Assessment of Security and Privacy Issues for Regulation
Analysis of Potential Regulatory Approaches