Length: 4 Days
Print Friendly, PDF & Email

5G Security Training

There’s no mincing words: While 5G technology benefits society, cybersecurity professionals fear a new era of cyber war that this advanced technology will likely bring along with it.

One area of intense concern is the possibility of increased denial of service attacks (DDoS). The connection is 5G’s capacity for increasing Internet of Things (IoT) devices such as refrigerators, coffee pots, microwaves and even light bulbs. The expansion of these devices will allow many more users to remotely check the contents of their refrigerators or dim their house lights using cell phones.

Unfortunately, bad actors will be looking for vulnerabilities to exploit.

Make no doubt about it, 5G security professionals are preparing for war with cybercriminals.

This has become a necessity due to 5G’s greater vulnerabilities to cyber-attacks. In preparation for the inevitable, organizations are looking for an arsenal of new weapons to combat bad actors. One promising weapon is artificial intelligence (AI).

Artificial intelligence techniques can be used to learn how to remove noise or unwanted data and to enable security experts to understand the cyber environment in order to detect abnormal activity.

AI can also benefit cybersecurity with automated techniques to generate whenever cyber threats are detected. Artificial intelligence is able to analyze massive amounts of data and allow the development of existing systems and software in an appropriate way to reduce cyber-attacks.

Most security experts believe machine learning is a good fit for anti-malware solutions because machine learning is well suited to solve “fuzzy” problems.

It’s proven that machine-learning database can draw upon information about any form of malware that’s been detected before. So when a new form of malware appears — either a tweaked variant of existing malware, or a new kind entirely — the system can check it against the database, examining the code and blocking the attack on the basis that similar events have previously been deemed as malicious.

Additionally, all organizations need to stop and fix advanced malware before standalone (SA) 5G arrives over the next few months. This involves going beyond signature-based tools to spot the attacks designed to evade basic filters. Behavior-based checks on endpoints are important. Once you detect a threat, organizations should remove all instances of it on the network.

Security advocates are also calling for an open and secure 5G network that enables network resources to be securely exposed to third parties – so mobile operators can maximize 5G adoption and monetization of 5G network resources.

5G Security Training Course by Tonex

Tonex 5G Security Training is an essential element in the development of security policies and technologies to protect 5G wireless networks from hacking, cyberattacks and financial fraud.

Key objectives & gained skill: The goal of this hands-on practical course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in the 5G, 5G NR, 5GC, Service Based Architecture (SBA), HTTP2/JSON and REST API, and optional non 3GPP radio including 802.11ax, mmWave/802.11ay radio and core network. The course focuses both on the air interface and the core network security principles, vulnerabilities, attack vectors and mitigation.

The upside of 5G technology has been pretty well disseminated: speedier transmissions, low latency and providing massive connectivity. But do we really understand the consequences, as in security risks?

Each generation of communications networks have had their share of security issues. But this matter merits top shelf attention given that 5G will handle highly sensitive applications such as life or death remote surgery.

There’s also concern that 5G security may turn into an all-out geopolitical issue: Do countries place themselves at risk by relying on 5G equipment built in nations with potentially adversarial governments?

On top of that, independent researchers recently identified potential issues with 5G’s authentication protocols. Researchers at Purdue University discovered 11 serious vulnerabilities in the 5G architecture including stingrays, also called “IMSI catchers” after the international mobile subscriber identity number attached to every cellphone.

For some time security personnel have been saying that companies should build products that require users to change passwords before using them. A related issue: IoT devices aren’t always easy to update when a security flaw is identified in their software. This is not good news given that 5G technology relies on more software compared to older networks.

As a result, the networks could be easier for hackers to manipulate by exploiting vulnerabilities in poorly written software. In fact, the European Commission, the EU’s executive arm, warned of this in a report published in October.

Many believe the fix is for manufacturers to make updates available for years to come so products don’t need to be replaced when a flaw is found.

COURSE NAMELENGTH
5G and mmWave Antenna Engineering Training3 days
5G Cybersecurity Bootcamp | 3GPP Version4 days
5G for Sales and Tech Sales/Support Training2 days
5G NR Training | 5G New Radio (NR)2 days
5G Security Training | 5G Wireless Security Training4 days
5G Training for Non Engineers | 5G Wireless Training for Non Engineers2 days
5G Training | 5G System Survey Training2 days
5G Wi-Fi Offload Training | LTE-U | LAA2 days
5G Wireless Crash Course4 days
5G Wireless Networks Training | The Fundamentals2 days
5G Wireless Training for Non-Engineers2 days
5G Wireless Training | 5G Technical Fundamentals3 days
C-RAN Training | Cloud-RAN Training2 days
D2D Communications Training | 5G Device to Device Communications2 days
LTE Advanced Pro Training3 days
LTE, LTE-A, and LTE-A Pro Migration to 5G Training3 days
mmW Technology Training | Millimeter Wave Training3 days
Mobile Broadband Transformation Training Bootcamp | 3GPP 5G Training4 days
Next Generation Wireless Networks Crash Course4 days
Non-Orthogonal Multiple Access (NOMA) Training | Future 5G Technologies3 days
Vehicle-to-Vehicle Communications Training | V2V Communications Training | v2v Training3 days

Course Modules (Optional modules included)

Module 1: Introduction to 5G Networks and Systems

  • 5G 101
  • 3GPP 5G-NR
  • IEEE 802.11ax, mmWave/802.11ay
  • 5G Communications Overview
  • Channels and Carriers
  • Channelization
  • 5G Access Techniques
  • 5G Services
  • Broadcasting, Mobile and Fixed 5G Service
  • 5G communications systems engineering principals
  • Service and Performance Requirements
  • 5G New Radio (NR)
  • 5G NR FDD/TDD CA
  • Non-Standalone (NSA)
  • Standalone (SA)
  • 5G NR Sub-6 GHz Standalone (NSA)
  • 5G NR Sub-6 GHz Non-Standalone (SA)
  • 5G NR Baseband
  • 5G NR UE
  • 5G NR gNodeB
  • Carrier Aggregation (CA) and Dual Connectivity
  • VoLTE & CS voice
  • NFV and SDN
  • VoNR & fallback to VoLTE
  • Mission-critical services
  • Massive Internet of Things
  • Licensed/shared/unlicensed
  • Above 24 GHz (mmWave)
  • 1 GHz to 6 GHz
  • Below 1 GHz
  • Scalable OFDM-based air interface
  • Scalable OFDM numerology
  • Flexible slot-based framework
  • Self-containedslot structure
  • Advanced channel coding
  • Massive MIMO
  • Reciprocity-based MU-MIMO
  • Mobile mmWave
  • Multi-Edge LDPC and CRC-Aided Polar
  • Scalable OFDM-based 5G NR air interface

Module 2: 5G Network and System Architecture

  • 5G Architectural Components
  • Uplink and Downlink Transmissions
  • Architectures Defined by Function
  • 5G System Functions
  • 5G Design
  • Platforms for Terminal (Chips, OS, MMI, etc.)
  • Transmission (coding, modulations, etc.)
  • Design considerations
  • Capabilities and limitations
  • Product development process
  • Autonomous 5G Control
  • Network Management
  • Network Operations Center (NOC)

Module 3: 5G Communications Technology Principles

  • 5G communication systems
  • 5G constellations
  • Spot beams
  • Radio Link
  • Spectrum issues
  • Propagation characteristics
  • 5G RF Link
  • Multiple access principles
  • Antennas
  • 5G system performance
  • System trade-offs
  • System trade-offs
  • Access methods
  • Propagation Interference and Regulation
  • Modems
  • Link budget
  • Link margin

Module 4: 5G Technology Engineering Across the SDLC

  • The Path from Concepts, Development to Decommissioning
  • IT systems to collect, generate, store, process, transmit and receive information
  • End-to-end encryption
  • Techniques and Architectures
  • Protection of all transmitted data over any communications link
  • Secure Networking for 5G in multiple orbits with multiple communications links and multiple remote users
  • Autonomous detection and response to malicious cyber events

Module 5: The 5G System Survey

  • Principles of 5G Core (5GC)
  • Principles of 5G New Radio (5G NR)
  • NR, gNB, NG-RAN and 5GC
  • NG RAN
  • Dual Connectivity options

Module 6: 5G Core Architecture Overview

  • Changes and Improvements Compared to 4G
  • CP/UP Split
  • NW Slicing
  • Key Network Functions
  • Network Connectivity
  • Service-Based Architecture (SBA)
  • Network interfaces and services
  • Network Exposure Function
  • Protocols
  • Control and User Plane separation
  • Modularization
  • Virtualization
  • Service-based Architecture (SBA)
  • Network Slicing
  • NFV and SDN
  • Multi-Access Edge Computing (MEC)
  • Network Slicing
  • Benefits of network slicing
  • Network Slice Selection Function
  • Interworking with 4G EPC
  • 5G Protocol Stack (OSI-based)
  • Quick Compare: Verizon, AT&T, T-Mobile, Sprint, others
  • Virtualizing the 5G Network Core and use Mobile Edge Computing (MEC)

Module 7: 5G Identifiers

  • Subscription Permanent Identifier (SUPI)
  • Subscription Concealed Identifier (SUCI)
  • Subscription Identification Security
  • Permanent Equipment Identifier
  • Subscription Identifier De-concealing Function
  • 5G Globally Unique Temporary Identifier

Module 8: Intro to 5G Security

  • 5G communications systems architecture
  • Security Issues and Challenges in 5G Communications Systems
  • Mobile Malware Attacks Targeting UE
  • ITU-T and 3GPP Security Frameworks
  • LTE, LTE-Advanced and LTE-Pro Security Principles
  • LTE-U and LAA Security
  • 802.11ax Security applied to 5G
  • 802.11ah Security applied to 5G
  • 802.11ay Security applied to 5G
  • Self-Organizing Network (SON)
  • Voice over Wi-Fi (VoWiFi) Security
  • Direct and D2D Communication Security
  • IoT Security
  • NFV Security
  • Software Defined Networking (SDN) Security
  • Cloud and Virtualization Security
  • C-RAN Security
  • V2V Security
  • Securing 5G Automation
  • 5G Monitoring and Security Operations
  • Cloud Security applied to 5G
  • LTE-Advanced, LTE-Pro and 5G Network Penetration Testing and Ethical Hacking
  • Active 5G Defense, Offensive Countermeasures and Cyber Deception
  • 5G RAN and NexGen Core Network Penetration Testing and Ethical Hacking
  • IMS Security
  • Implementing and Auditing 5G Security Controls
  • Social Engineering for 5G Penetration Testers
  • 5G UE Security and Ethical Hacking
  • 5G Virtualization and Private Cloud Security
  • 5G Wireless Ethical Hacking, Penetration Testing, and Defenses
  • Advanced LTE, LTE-Advanced ,LTE-Advanced Pro, and 5G Exploit Development for Penetration Testers
  • 5G Forensics Analysis
  • Advanced 5G  Forensics, Incident Response, and Threat Hunting
  • 5G Cyber Threat Intelligence
  • Advanced 5G Forensics: Applied to IoT, V2V and Autonomous Things
  • Reverse-Engineering 5G Analysis Tools and Techniques
  • 5G Cyber Security Risk Management
  • 5G Security Automation, Incident Response Team Management
  • Secure DevOps
  • 5G Data Security and Investigations
  • Physical 5G Penetration Testing
  • Physical Wireless Access Control Systems Elements of Design, Offense/Defense
  • 5G Mobile Botnets
  • Bot-masters and Bot-proxies
  • 5G UE Location Tracking
  • 5G Pen Testing

Module 9: 5G Networks and System Cybersecurity Assessment and Best Practices

  • 5G Systems Attacks
  • Uniquely Network Concerns
  • Reliability and Security
  • Role of Obscurity
  • Threat Assessment
  • Attackers and Assets
  • Attack Surface
  • Attack Trees
  • Security Policy
  • 5G System Vulnerabilities
  • Backdoors
  • Denial of Service (DOS)
  • Defensive Architectures
  • Combating Complexity
  • Defensive Hardware Interfaces
  • Public Key Cryptography (PKI)
  • Protecting Data In Motion
  • Secure Software Process

Module 10: 5G System Vulnerability Analysis

  • 5G System and Network Attacks
  • Exploiting 5G Systems and Devices
  • The Stages of System Exploitation
  • Initial Reconnaissance
  • Exploitation
  • Firmware Unpacking and Modification
  • Detecting
  • Extracting
  • Analysis
  • Modification and Creation of new firmware
  • Hacking/exploitation techniques, tools and entry points
  • Defensive technologies

Module 11: Cybersecurity Attacks and Best Mitigation Practices for 5G Systems

  • Non-Invasive Hardware Reverse Engineering
  • Component identification
  • Interface Analysis
  • Communications Protocols Sniffing
  • Decoding and Deciphering Captured Bits
  • Critical Data Identification and Detection
  • Component Removal and Replacement
  • Electronics and Circuit analysis
  • Security Measures

Module 12: 5G Security Requirements and Features

  • 3GPP General security requirements
  • Requirements on the UE
  • Requirements on the gNB
  • Requirements on the ng-eNB
  • Requirements on the AMF
  • Requirements on the SEAF
  • Requirements on the UDM
  • Core network security
  • Trust boundaries
  • Visibility and configurability
  • Requirements for algorithms, and algorithm selection

Module 13: Tonex 5G Security Workshop/Recommendations

  • Key Issues
  • Embedded SIM Security
  • mmWave Security Issues
  • 5G Autonomous Driving Security Solutions
  • Critical 5G Security Controls Planning, Implementing and Auditing
  • Top 5G Mitigation Strategies Implementing and Auditing
  • Advanced 5G Security Principles
  • 5G Intrusion Detection
  • 5G Wireless Hacker Tools, Techniques, Exploits and Incident Handling
  • Issues with Access Network Flash Network Traffic
  • Radio interface key management
  • User plane integrity
  • Security measures
  • DOS Attacks Against Network Infrastructure
  • Overload of the signaling plane security issues
  • Bulk configuration security issues

Module 14: Tonex 5G Cybersecurity Assessment (Workshop using DoD RMF Templates)

  • Overview of Risk Management Framework (RMF)
  • RMF as a set of criteria that dictate how United States government IT systems must be architected, secured, and monitored
  • RMF and National Institute of Standards and Technology (NIST) foundation for any data security strategy.
  • Evaluate 5G system security vulnerabilities
  • Assessing cyber-related information and control systems to relevant regulations, standards and guidance
  • Gap analysis to unveil security holes
  • real-time situational awareness
  • Insider and external threat protection
  • System hardening and active defenses for comprehensive protection of 5G system 5G environment
  • 5G cybersecurity patching

Module 15: Tonex 5G Cybersecurity Assessment (Workshop using ISO 27001, ISA/IEC 62443 Frameworks)

  • ISO 27001:2013 as the international standard framework for Information Security Management Systems (ISMS)
  • Evaluating continued confidentiality, integrity and availability of information as well as legal compliance
  • ISO 27001 implementation and potential security threats: analysis and mitigation
  • ISO 27001 applied to 5G
  • ISA/IEC 62443 Cybersecurity
  • Overview of IEC 62443-4-1:2018
  • Security for industrial automation and control systems
  • Secure product development lifecycle requirements
  • IEC 62443 applied to 5G and critical infrastructure protection
  • ISA/IEC 62443 Cybersecurity Fundamentals Specialist
  • ISA/IEC 62443 Cybersecurity Risk Assessment Specialist
  • ISA/IEC 62443 Cybersecurity Design Specialist
  • ISA/IEC 62443 Cybersecurity Maintenance Specialist
  • ISA/IEC 62443 Cybersecurity Expert: Individuals who achieve Certificates 1, 2, 3, and 4 are designated as ISA/IEC 62443 Cybersecurity Experts

5G Security Training

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.