5G Network Security Training: Advanced Techniques and ProtocolsSecurity and Safety

In any city around the world 00447455203759 Course Code: AC/2024/23

Course Description

Introduction

5G has the potential to make the world much more connected. Devices in locations without access to traditional broadband networks can be deployed using 5G network connectivity. Higher speeds, lower latency, and increased capacity also make it a potential option for devices where 4G LTE was not a viable option. However, with this growth in systems connected to 5G networks also comes potential security implications. Businesses deploying 5G-connected devices need security solutions capable of monitoring and securing them against cyber threats.

 5G Network Security Training course presents old and new threats, security aspects, requirements, and recommendations from various organizations, and then the new, improved functions and procedures designed to improve the security of the future 5G networks for communication with regular users and a growing number of IoT devices.

The course provides a comprehensive grounding in this expanded set of security requirements and mechanisms used in 5G. We start by considering the 5G architecture in order to better understand the overall security requirements for both the UE and network. We then build on the security architecture of 4G LTE, with relevant modifications and additions required for 5G, before focusing squarely on the additional features and procedures required to secure the 5G Core Network (Service Based Interface).

Course Objectives

By the end of this course, participants will be able to:

·         Describe typical mobile access authentication methods

·        Describe the 5G enablers

·        Understand the Novel technologies for 5G security

·        Describe the WBPLSec system model

·        Describe LiFi technology

·        Describe Software Defined Monitoring architecture

·        Understand IoT security requirements

·        Understand security issues surrounding positioning technologies

·        Understand customer edge security issues

·        Understand the security issues within the MVNO environments

·        Understand security surrounding Mobile Cloud

Target Audience

This course is designed for:

·        Engineers, managers and other personnel who have a need to acquire a technical overview of the security environment employed within 5G networks.

·        It will also be of benefit to those in the wider technical community who have a need to understand the security protocols employed by advanced cellular networks.

Course Outlines

Day 1:Introduction to 5G Networks and Systems

·         5G Communications Overview

·        Channels and Carriers

·        Channelization

·        5G Access Techniques

·        5G Services

·        Broadcasting, Mobile and Fixed 5G Service

·        5G communications systems engineering principals

·        Service and Performance Requirements

Day 2: 5G Network Security

·          5G-WLAN security

·        Introduction to WiFi-5G network interoperability

·        Overview of network architecture for WiFi-5G network interoperability

·        5G-WiFi security challenges

·        Security consideration for architectural design of WiFi-5G networks

·        Introduction to LiFi-5G network interoperability

·        5G-LiFi security challenges

·        Security consideration for architectural design of LiFi-5G networks

·        Safety of 5G network physical infrastructures

·        Deployment in 5G Networks

·        Software Defined Security Monitoring in 5G Networks

·        Existing Monitoring Techniques

Day 3: 5G Positioning

·         Outdoor versus Indoor Positioning Technologies

·        Passive versus Active Positioning

·        Overview of 5G Positioning Mechanisms

·        Main Privacy Concerns

·        Passive versus Active Positioning Concepts

·        Physical Layer-based Security Enhancement Mechanisms for Positioning

·        Enhancing Trustworthiness

Day 4 :5G Cloud and Virtual Network Security

·         Mobile Virtual Network Operators (MVNO) Security

·        Cloudification of the Network Operators

·        TaaS Deployment Security

·        Future Directions

·        NFV and NFV-based Security Services

·        5G, NFV and Security

Day 5: MEC in 5G Networks

·         Security Challenges in 5G Cloud

·        Legal Framework for Security and Privacy

·        Security and Privacy Issues in New 5G Technologies

·        Relevance Assessment of Security and Privacy Issues for Regulation

·        Analysis of Potential Regulatory Approaches