Price: $1,999.00

Course Number: 545
Length: 2 Days
Print Friendly, PDF & Email

GERAN, HSPA/HSPA+ and LTE Security Training

Having completed this course the participant will be able to understand how security is implemented, deployed and managed in GSM, GPRS, UMTS/HSPA/HSPA+, LTE/EPC networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented.

Who Should Attend

Anyone needing in-depth knowledge of the security in the GSM family of wireless networks. The course is essential for network security & wireless specialists, operators and manufacturers, wireless network researcher, academics, security engineers, researchers and consultants.

Objectives

The goal of this course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in the GSM/GPRS/UMTS radio and core network. The course focuses both on the air interface and the core network.

Outline

Security Overview

  • Basic security concepts
  • Authentication
  • Privacy
  • Integrity
  • Authorization
  • Non-repudiation

Encryption

  • Encryption Technologies
  • Cryptography Keys
  • Symmetric and Asymmetric
  • Ciphers
  • Cipher Suites
  • Certificates

Overview of Wireless Security Requirements

  • Wireless security needs
  • Basic GSM, GPRS and UMTS security functions

GSM Security Review

  • GSM security algorithms
  • GSM authentication and authorization procedures
  • GSM ciphering procedures
  • Security threats to GSM

GPRS Security Review

  • GPRS security algorithms
  • GSM authentication and authorization procedures
  • GPRS ciphering procedures
  • Kasumi, GEA1, GEA2 and GEA3
  • Security threats to GPRS

UMTS Security Review

  • Security in UTRAN
  • Security in the UMTS Core Network
  • UMTS security algorithms
  • UMTS authentication and authorization procedures
  • UMTS ciphering procedures
  • Security threats to UMTS

UMTS Authentication and Key Management

  • AKA Algorithms
  • Normal AKA procedure
  • AKA procedure in the AuC
  • AKA procedure in the USIM
  • AKA procedure in the VLR/SGSN
  • Integrity function f9, Confidentiality function f8
  • Milenage and KASUMI algorithms

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.