Length: 4 Days
Print Friendly, PDF & Email

5G Security Training

The evolution of the 5G network has become a good news/bad news riddle.

On the one hand, with standalone (SA) 5G about to become a reality in the U.S., there’s little doubt that this one architectural advance will underpin radical and beneficial transformations in what we can do and how we manage our lives.

On the other hand, cybersecurity professionals warn that the nation’s service providers are not prepared to address the totality of the cyber threat.

And it’s not just cybersecurity experts doling out the concerns. The president’s National Security Telecommunications Advisory Committee has gone on record as stating that the cybersecurity threat now poses an existential threat to the future of the nation.

5G is expected to have a huge impact on cybersecurity and network security as well as public safety and more when the full standalone (SA) launches late 2020 or early 2021.

The experts all agree, as 5G implementations evolve and mature, security needs to become even stronger. Consumers should expect added encryption, additional defense at the edge of the network, and technologies such as network function virtualization, mobile edge computer, and network slicing that can make networks more secure.

The architecture of 5G expands cyber risks in several ways. For one thing, the new 5G network has moved away from centralized, hardware-based switching to distributed, software-defined digital routing. Previous networks were hub-and-spoke designs in which everything came to hardware choke points where cyber hygiene could be practiced.

In the 5G software defined network, however, that activity is pushed outward to a web of digital routers throughout the network, thus denying the potential for chokepoint inspection and control.

Also, the substantial expansion of bandwidth that makes 5G possible creates additional avenues of attack. Physically, low-cost, short range, small-cell antennas deployed throughout urban areas become new hard targets.

5G further complicates its cyber vulnerability by virtualizing in software higher-level network functions formerly performed by physical appliances. These activities are based on the common language of Internet Protocol and well-known operating systems. Whether used by nation-states or criminal actors, these standardized building block protocols and systems have proven to be valuable tools for bad actors.

And, of course, there has been much attention paid to the vulnerabilities created by the expansion of the Internet of Things (IoT) – that is, the massive connectivity factor of tens of billions of hackable smart devices to the 5G network. While this inexhaustible list of connected devices is a boon for transportation, public safety and healthcare, the IoT definitely provides unique vulnerabilities to be exploited through cybercrime.

5G Security Training Course by Tonex

Tonex 5G Security Training is an essential element in the development of security policies and technologies to protect 5G wireless networks from hacking, cyberattacks and financial fraud.

Key objectives & gained skill: The goal of this hands-on practical course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in the 5G, 5G NR, 5GC, Service Based Architecture (SBA), HTTP2/JSON and REST API, and optional non 3GPP radio including 802.11ax, mmWave/802.11ay radio and core network. The course focuses both on the air interface and the core network security principles, vulnerabilities, attack vectors and mitigation.

The upside of 5G technology has been pretty well disseminated: speedier transmissions, low latency and providing massive connectivity. But do we really understand the consequences, as in security risks?

Each generation of communications networks have had their share of security issues. But this matter merits top shelf attention given that 5G will handle highly sensitive applications such as life or death remote surgery.

There’s also concern that 5G security may turn into an all-out geopolitical issue: Do countries place themselves at risk by relying on 5G equipment built in nations with potentially adversarial governments?

On top of that, independent researchers recently identified potential issues with 5G’s authentication protocols. Researchers at Purdue University discovered 11 serious vulnerabilities in the 5G architecture including stingrays, also called “IMSI catchers” after the international mobile subscriber identity number attached to every cellphone.

For some time security personnel have been saying that companies should build products that require users to change passwords before using them. A related issue: IoT devices aren’t always easy to update when a security flaw is identified in their software. This is not good news given that 5G technology relies on more software compared to older networks.

As a result, the networks could be easier for hackers to manipulate by exploiting vulnerabilities in poorly written software. In fact, the European Commission, the EU’s executive arm, warned of this in a report published in October.

Many believe the fix is for manufacturers to make updates available for years to come so products don’t need to be replaced when a flaw is found.

5G and mmWave Antenna Engineering Training3 days
5G Cybersecurity Bootcamp | 3GPP Version4 days
5G for Sales and Tech Sales/Support Training2 days
5G NR Training | 5G New Radio (NR)2 days
5G Security Training | 5G Wireless Security Training4 days
5G Training for Non Engineers | 5G Wireless Training for Non Engineers2 days
5G Training | 5G System Survey Training2 days
5G Wi-Fi Offload Training | LTE-U | LAA2 days
5G Wireless Crash Course4 days
5G Wireless Networks Training | The Fundamentals2 days
5G Wireless Training for Non-Engineers2 days
5G Wireless Training | 5G Technical Fundamentals3 days
C-RAN Training | Cloud-RAN Training2 days
D2D Communications Training | 5G Device to Device Communications2 days
LTE Advanced Pro Training3 days
LTE, LTE-A, and LTE-A Pro Migration to 5G Training3 days
mmW Technology Training | Millimeter Wave Training3 days
Mobile Broadband Transformation Training Bootcamp | 3GPP 5G Training4 days
Next Generation Wireless Networks Crash Course4 days
Non-Orthogonal Multiple Access (NOMA) Training | Future 5G Technologies3 days
Vehicle-to-Vehicle Communications Training | V2V Communications Training | v2v Training3 days

Course Modules (Optional modules included)

Module 1: Introduction to 5G Networks and Systems

  • 5G 101
  • 3GPP 5G-NR
  • IEEE 802.11ax, mmWave/802.11ay
  • 5G Communications Overview
  • Channels and Carriers
  • Channelization
  • 5G Access Techniques
  • 5G Services
  • Broadcasting, Mobile and Fixed 5G Service
  • 5G communications systems engineering principals
  • Service and Performance Requirements
  • 5G New Radio (NR)
  • Non-Standalone (NSA)
  • Standalone (SA)
  • 5G NR Sub-6 GHz Standalone (NSA)
  • 5G NR Sub-6 GHz Non-Standalone (SA)
  • 5G NR Baseband
  • 5G NR UE
  • 5G NR gNodeB
  • Carrier Aggregation (CA) and Dual Connectivity
  • VoLTE & CS voice
  • NFV and SDN
  • VoNR & fallback to VoLTE
  • Mission-critical services
  • Massive Internet of Things
  • Licensed/shared/unlicensed
  • Above 24 GHz (mmWave)
  • 1 GHz to 6 GHz
  • Below 1 GHz
  • Scalable OFDM-based air interface
  • Scalable OFDM numerology
  • Flexible slot-based framework
  • Self-containedslot structure
  • Advanced channel coding
  • Massive MIMO
  • Reciprocity-based MU-MIMO
  • Mobile mmWave
  • Multi-Edge LDPC and CRC-Aided Polar
  • Scalable OFDM-based 5G NR air interface

Module 2: 5G Network and System Architecture

  • 5G Architectural Components
  • Uplink and Downlink Transmissions
  • Architectures Defined by Function
  • 5G System Functions
  • 5G Design
  • Platforms for Terminal (Chips, OS, MMI, etc.)
  • Transmission (coding, modulations, etc.)
  • Design considerations
  • Capabilities and limitations
  • Product development process
  • Autonomous 5G Control
  • Network Management
  • Network Operations Center (NOC)

Module 3: 5G Communications Technology Principles

  • 5G communication systems
  • 5G constellations
  • Spot beams
  • Radio Link
  • Spectrum issues
  • Propagation characteristics
  • 5G RF Link
  • Multiple access principles
  • Antennas
  • 5G system performance
  • System trade-offs
  • System trade-offs
  • Access methods
  • Propagation Interference and Regulation
  • Modems
  • Link budget
  • Link margin

Module 4: 5G Technology Engineering Across the SDLC

  • The Path from Concepts, Development to Decommissioning
  • IT systems to collect, generate, store, process, transmit and receive information
  • End-to-end encryption
  • Techniques and Architectures
  • Protection of all transmitted data over any communications link
  • Secure Networking for 5G in multiple orbits with multiple communications links and multiple remote users
  • Autonomous detection and response to malicious cyber events

Module 5: The 5G System Survey

  • Principles of 5G Core (5GC)
  • Principles of 5G New Radio (5G NR)
  • NR, gNB, NG-RAN and 5GC
  • NG RAN
  • Dual Connectivity options

Module 6: 5G Core Architecture Overview

  • Changes and Improvements Compared to 4G
  • CP/UP Split
  • NW Slicing
  • Key Network Functions
  • Network Connectivity
  • Service-Based Architecture (SBA)
  • Network interfaces and services
  • Network Exposure Function
  • Protocols
  • Control and User Plane separation
  • Modularization
  • Virtualization
  • Service-based Architecture (SBA)
  • Network Slicing
  • NFV and SDN
  • Multi-Access Edge Computing (MEC)
  • Network Slicing
  • Benefits of network slicing
  • Network Slice Selection Function
  • Interworking with 4G EPC
  • 5G Protocol Stack (OSI-based)
  • Quick Compare: Verizon, AT&T, T-Mobile, Sprint, others
  • Virtualizing the 5G Network Core and use Mobile Edge Computing (MEC)

Module 7: 5G Identifiers

  • Subscription Permanent Identifier (SUPI)
  • Subscription Concealed Identifier (SUCI)
  • Subscription Identification Security
  • Permanent Equipment Identifier
  • Subscription Identifier De-concealing Function
  • 5G Globally Unique Temporary Identifier

Module 8: Intro to 5G Security

  • 5G communications systems architecture
  • Security Issues and Challenges in 5G Communications Systems
  • Mobile Malware Attacks Targeting UE
  • ITU-T and 3GPP Security Frameworks
  • LTE, LTE-Advanced and LTE-Pro Security Principles
  • LTE-U and LAA Security
  • 802.11ax Security applied to 5G
  • 802.11ah Security applied to 5G
  • 802.11ay Security applied to 5G
  • Self-Organizing Network (SON)
  • Voice over Wi-Fi (VoWiFi) Security
  • Direct and D2D Communication Security
  • IoT Security
  • NFV Security
  • Software Defined Networking (SDN) Security
  • Cloud and Virtualization Security
  • C-RAN Security
  • V2V Security
  • Securing 5G Automation
  • 5G Monitoring and Security Operations
  • Cloud Security applied to 5G
  • LTE-Advanced, LTE-Pro and 5G Network Penetration Testing and Ethical Hacking
  • Active 5G Defense, Offensive Countermeasures and Cyber Deception
  • 5G RAN and NexGen Core Network Penetration Testing and Ethical Hacking
  • IMS Security
  • Implementing and Auditing 5G Security Controls
  • Social Engineering for 5G Penetration Testers
  • 5G UE Security and Ethical Hacking
  • 5G Virtualization and Private Cloud Security
  • 5G Wireless Ethical Hacking, Penetration Testing, and Defenses
  • Advanced LTE, LTE-Advanced ,LTE-Advanced Pro, and 5G Exploit Development for Penetration Testers
  • 5G Forensics Analysis
  • Advanced 5G  Forensics, Incident Response, and Threat Hunting
  • 5G Cyber Threat Intelligence
  • Advanced 5G Forensics: Applied to IoT, V2V and Autonomous Things
  • Reverse-Engineering 5G Analysis Tools and Techniques
  • 5G Cyber Security Risk Management
  • 5G Security Automation, Incident Response Team Management
  • Secure DevOps
  • 5G Data Security and Investigations
  • Physical 5G Penetration Testing
  • Physical Wireless Access Control Systems Elements of Design, Offense/Defense
  • 5G Mobile Botnets
  • Bot-masters and Bot-proxies
  • 5G UE Location Tracking
  • 5G Pen Testing

Module 9: 5G Networks and System Cybersecurity Assessment and Best Practices

  • 5G Systems Attacks
  • Uniquely Network Concerns
  • Reliability and Security
  • Role of Obscurity
  • Threat Assessment
  • Attackers and Assets
  • Attack Surface
  • Attack Trees
  • Security Policy
  • 5G System Vulnerabilities
  • Backdoors
  • Denial of Service (DOS)
  • Defensive Architectures
  • Combating Complexity
  • Defensive Hardware Interfaces
  • Public Key Cryptography (PKI)
  • Protecting Data In Motion
  • Secure Software Process

Module 10: 5G System Vulnerability Analysis

  • 5G System and Network Attacks
  • Exploiting 5G Systems and Devices
  • The Stages of System Exploitation
  • Initial Reconnaissance
  • Exploitation
  • Firmware Unpacking and Modification
  • Detecting
  • Extracting
  • Analysis
  • Modification and Creation of new firmware
  • Hacking/exploitation techniques, tools and entry points
  • Defensive technologies

Module 11: Cybersecurity Attacks and Best Mitigation Practices for 5G Systems

  • Non-Invasive Hardware Reverse Engineering
  • Component identification
  • Interface Analysis
  • Communications Protocols Sniffing
  • Decoding and Deciphering Captured Bits
  • Critical Data Identification and Detection
  • Component Removal and Replacement
  • Electronics and Circuit analysis
  • Security Measures

Module 12: 5G Security Requirements and Features

  • 3GPP General security requirements
  • Requirements on the UE
  • Requirements on the gNB
  • Requirements on the ng-eNB
  • Requirements on the AMF
  • Requirements on the SEAF
  • Requirements on the UDM
  • Core network security
  • Trust boundaries
  • Visibility and configurability
  • Requirements for algorithms, and algorithm selection

Module 13: Tonex 5G Security Workshop/Recommendations

  • Key Issues
  • Embedded SIM Security
  • mmWave Security Issues
  • 5G Autonomous Driving Security Solutions
  • Critical 5G Security Controls Planning, Implementing and Auditing
  • Top 5G Mitigation Strategies Implementing and Auditing
  • Advanced 5G Security Principles
  • 5G Intrusion Detection
  • 5G Wireless Hacker Tools, Techniques, Exploits and Incident Handling
  • Issues with Access Network Flash Network Traffic
  • Radio interface key management
  • User plane integrity
  • Security measures
  • DOS Attacks Against Network Infrastructure
  • Overload of the signaling plane security issues
  • Bulk configuration security issues

Module 14: Tonex 5G Cybersecurity Assessment (Workshop using DoD RMF Templates)

  • Overview of Risk Management Framework (RMF)
  • RMF as a set of criteria that dictate how United States government IT systems must be architected, secured, and monitored
  • RMF and National Institute of Standards and Technology (NIST) foundation for any data security strategy.
  • Evaluate 5G system security vulnerabilities
  • Assessing cyber-related information and control systems to relevant regulations, standards and guidance
  • Gap analysis to unveil security holes
  • real-time situational awareness
  • Insider and external threat protection
  • System hardening and active defenses for comprehensive protection of 5G system 5G environment
  • 5G cybersecurity patching

Module 15: Tonex 5G Cybersecurity Assessment (Workshop using ISO 27001, ISA/IEC 62443 Frameworks)

  • ISO 27001:2013 as the international standard framework for Information Security Management Systems (ISMS)
  • Evaluating continued confidentiality, integrity and availability of information as well as legal compliance
  • ISO 27001 implementation and potential security threats: analysis and mitigation
  • ISO 27001 applied to 5G
  • ISA/IEC 62443 Cybersecurity
  • Overview of IEC 62443-4-1:2018
  • Security for industrial automation and control systems
  • Secure product development lifecycle requirements
  • IEC 62443 applied to 5G and critical infrastructure protection
  • ISA/IEC 62443 Cybersecurity Fundamentals Specialist
  • ISA/IEC 62443 Cybersecurity Risk Assessment Specialist
  • ISA/IEC 62443 Cybersecurity Design Specialist
  • ISA/IEC 62443 Cybersecurity Maintenance Specialist
  • ISA/IEC 62443 Cybersecurity Expert: Individuals who achieve Certificates 1, 2, 3, and 4 are designated as ISA/IEC 62443 Cybersecurity Experts

5G Security Training

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.