Print Friendly, PDF & Email

5G Security Training | Crash Course

5G architecture has closed the gap on some security issues that haunted its predecessor, 4G.

For example, many anti-tracking and spoofing features now make it harder for cybercriminals on a network to track and manipulate individual device connections. 5G accomplishes this by encrypting more data so less is “out there” in the clear for anyone to intercept.

5G is also a much more software and cloud-based system than previous wireless networks, which will allow for better monitoring to spot potential threats.

But despite 5G’s promise for improved security, experts still have many concerns in this regard.

One vulnerability that was supposed to be fixed in 5G was the threat from “stingrays,” yet researchers found that these attacks were still possible in 5G. A stingray is a device that pretends to be a cellular tower in order to intercept and spy on mobile devices.

Another vulnerability allows cybercriminals to get hold of old and new temporary network identifiers of a user’s phone so they can discover the “paging occasion” and use it to track its location. This could also be used by an adversary to take over the paging channel and broadcast false emergency alerts.

The massive interconnectivity of IoT devices makes for a huge target for cybercriminals because they could be taken over to form what’s known as a botnet to perform distributed denial of service, or DDoS, attacks to paralyze networks.

But 5G security is even more challenging due to vertical 5G use-cases. These are parings such as connected cars and healthcare resulting in critical industry-specific security requirements.

A recent survey taken by BPI Network shows that a whopping 94% of industry experts and telecom operators expect security challenges to escalate with the advent of 5G networks.

Experts feel the best approach to providing sufficient cybersecurity for 5G architecture may be through the creation of a 5G ecosystem that includes infrastructure providers, mobile operators, vertical industries and regulators all working together.

Training in 5G security is also highly recommended for organizations, companies and agencies.

5G Security Training | Crash Courses by Tonex

5G Wireless training is a comprehensive 5G security engineering and technology awareness. Learn about 5G threats, exploits, defense techniques and procedures and policies to evaluate possible attacks and fraud in 5G wireless technology. For complete 5G Wireless courses CLICK HERE.

5G training courses take an in-depth look at the security challenges of LTE-Advanced, LTE-Advanced Pro, 802.11ax, 802.11ay, 802.11ah,  802.11aj and 5G wireless technologies including: 5G wireless security threats, attacks and mitigation.

Learning Objectives:

  • Learn about 5G network slices,  5G security principles, architecture, vulnerabilities, policies, attacks and mitigation
  • Identify and locate malicious rogue 5G systems
  • Conduct a penetration test against 5G networks to identify vulnerabilities
  • Identify 5G vulnerabilities and bypass authentication mechanisms
  • Utilize 5G fuzzing tools

5G Security Training

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.