Length: 4 Days
Print Friendly, PDF & Email

5G Security Training, 3GPP 5G NR and IMT-2000

Cybersecurity personnel predict that the biggest security challenge that 5G networks pose is to our privacy. 5G networks will enable new kinds of applications and will allow us to connect more devices to the network (and to each other), encouraging us to capture and share more and more of our personal data — some of which may never have been captured digitally before.

Case in point: eHealth applications are expected to gather information about our well-being while smart city applications collect significant amounts of data about how we live our lives. Add to that, connected car services will likely monitor our movements.

This data collection will be on a level of nothing ever seen before, elevated by the sheer number of connected devices. It’s even possible that in the 5G future, smartphones will become a kind of super connection hub for all other personal devices.

Additionally, all this mobile connectivity for M2M communication allows 5G-enabled devices to “talk” with countless sensors that make up the connected world.

And then there is always the possibility that while you are watching video content that is being distributed via 5G, you might be watched back.

The point is: With all these connection points in the 5G era, the opportunity for cybercriminals to harvest private data has never been greater.

The experts say, the key to making 5G secure is to make sure your security architecture evolves as you move to 5G.

Other experts in 5G cybercrimes believe the key to deflecting cyberattacks is in building security into 5G services by design, not as an afterthought. Fail proof security needs to be in place any time a new service is launched or new partners and customers are connected to the network. Without it, the massive new revenue opportunities of 5G will be at risk.

There’s also the commonly held belief that artificial intelligence (AI) will be mandatory for securing carrier 5G networks. At least it should fill in the gap where there is a workplace shortage. Working within the parameters of a company’s platform, it has become clear that a large amount of information must be used to train the algorithm. Programmers must teach the system the vernacular, which means feeding it a massive corpus of security knowledge.

With AI security screeners, platforms are needed that have the ability to retain cognitive adaptation, not solely knowledge. The belief is that a properly trained AI can adapt and think in unconventional ways. And it doesn’t have the notion of bias. It will read, digest and understand the alarms and incident information coming in, then offer a hypothesis to the analyst. Security analysts can then work with the tool to triage security events.

5G Security Training Courses by Tonex

Tonex 5G Security Training is an essential element in the development of security policies and technologies to protect 5G wireless networks from hacking, cyberattacks and financial fraud.

Key objectives & gained skill: The goal of this course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in the 5G, 5G NR, 802.11ax, mmWave/802.11ay radio and core network. The course focuses both on the air interface and the core network security principles, vulnerabilities, attack vectors and mitigation.

Modules (Optional modules included)

Module 1: Introduction to 5G Networks and Systems

  • 5G 101
  • 3GPP 5G-NR
  • IEEE 802.11ax, mmWave/802.11ay
  • 5G Communications Overview
  • Channels and Carriers
  • Channelization
  • 5G Access Techniques
  • 5G Services
  • Broadcasting, Mobile and Fixed 5G Service
  • 5G communications systems engineering principals
  • Service and Performance Requirements
  • 5G New Radio (NR)
  • 5G NR FDD/TDD CA
  • Non-Standalone (NSA)
  • Standalone (SA)
  • 5G NR Sub-6 GHz Standalone (NSA)
  • 5G NR Sub-6 GHz Non-Standalone (SA)
  • 5G NR Baseband
  • 5G NR UE
  • 5G NR gNodeB
  • Carrier Aggregation (CA) and Dual Connectivity
  • VoLTE & CS voice
  • NFV and SDN
  • VoNR & fallback to VoLTE
  • Mission-critical services
  • Massive Internet of Things
  • Licensed/shared/unlicensed
  • Above 24 GHz (mmWave)
  • 1 GHz to 6 GHz
  • Below 1 GHz
  • Scalable OFDM-based air interface
  • Scalable OFDM numerology
  • Flexible slot-based framework
  • Self-containedslot structure
  • Advanced channel coding
  • Massive MIMO
  • Reciprocity-based MU-MIMO
  • Mobile mmWave
  • Multi-Edge LDPC and CRC-Aided Polar
  • Scalable OFDM-based 5G NR air interface

Module 2: 5G Network and System Architecture

  • 5G Architectural Components
  • Uplink and Downlink Transmissions
  • Architectures Defined by Function
  • 5G System Functions
  • 5G Design
  • Platforms for Terminal (Chips, OS, MMI, etc.)
  • Transmission (coding, modulations, etc.)
  • Design considerations
  • Capabilities and limitations
  • Product development process
  • Autonomous 5G Control
  • Network Management
  • Network Operations Center (NOC)

Module 3: 5G Communications Technology Principles

  • 5G communication systems
  • 5G constellations
  • Spot beams
  • Radio Link
  • Spectrum issues
  • Propagation characteristics
  • 5G RF Link
  • Multiple access principles
  • Antennas
  • 5G system performance
  • System trade-offs
  • System trade-offs
  • Access methods
  • Propagation Interference and Regulation
  • Modems
  • Link budget
  • Link margin

Module 4: 5G Technology Engineering Across the SDLC

  • The Path from Concepts, Development to Decommissioning
  • IT systems to collect, generate, store, process, transmit and receive information
  • End-to-end encryption
  • Techniques and Architectures
  • Protection of all transmitted data over any communications link
  • Secure Networking for 5G in multiple orbits with multiple communications links and multiple remote users
  • Autonomous detection and response to malicious cyber events

Module 5: The 5G System Survey

  • Principles of 5G Core (5GC)
  • Principles of 5G New Radio (5G NR)
  • NR, gNB, NG-RAN and 5GC
  • NG RAN
  • Dual Connectivity options

Module 6: 5G Core Architecture Overview

  • Changes and Improvements Compared to 4G
  • CP/UP Split
  • NW Slicing
  • Key Network Functions
  • Network Connectivity
  • Service-Based Architecture (SBA)
  • Network interfaces and services
  • Network Exposure Function
  • Protocols
  • Control and User Plane separation
  • Modularization
  • Virtualization
  • Service-based Architecture (SBA)
  • Network Slicing
  • NFV and SDN
  • Multi-Access Edge Computing (MEC)
  • Network Slicing
  • Benefits of network slicing
  • Network Slice Selection Function
  • Interworking with 4G EPC
  • 5G Protocol Stack (OSI-based)
  • Quick Compare: Verizon, AT&T, T-Mobile, Sprint, others
  • Virtualizing the 5G Network Core and use Mobile Edge Computing (MEC)

Module 7: 5G Identifiers

  • Subscription Permanent Identifier (SUPI)
  • Subscription Concealed Identifier (SUCI)
  • Subscription Identification Security
  • Permanent Equipment Identifier
  • Subscription Identifier De-concealing Function
  • 5G Globally Unique Temporary Identifier

Module 8: Intro to 5G Security

  • 5G communications systems architecture
  • Security Issues and Challenges in 5G Communications Systems
  • Mobile Malware Attacks Targeting UE
  • ITU-T and 3GPP Security Frameworks
  • LTE, LTE-Advanced and LTE-Pro Security Principles
  • LTE-U and LAA Security
  • 802.11ax Security applied to 5G
  • 802.11ah Security applied to 5G
  • 802.11ay Security applied to 5G
  • Self-Organizing Network (SON)
  • Voice over Wi-Fi (VoWiFi) Security
  • Direct and D2D Communication Security
  • IoT Security
  • NFV Security
  • Software Defined Networking (SDN) Security
  • Cloud and Virtualization Security
  • C-RAN Security
  • V2V Security
  • Securing 5G Automation
  • 5G Monitoring and Security Operations
  • Cloud Security applied to 5G
  • LTE-Advanced, LTE-Pro and 5G Network Penetration Testing and Ethical Hacking
  • Active 5G Defense, Offensive Countermeasures and Cyber Deception
  • 5G RAN and NexGen Core Network Penetration Testing and Ethical Hacking
  • IMS Security
  • Implementing and Auditing 5G Security Controls
  • Social Engineering for 5G Penetration Testers
  • 5G UE Security and Ethical Hacking
  • 5G Virtualization and Private Cloud Security
  • 5G Wireless Ethical Hacking, Penetration Testing, and Defenses
  • Advanced LTE, LTE-Advanced ,LTE-Advanced Pro, and 5G Exploit Development for Penetration Testers
  • 5G Forensics Analysis
  • Advanced 5G  Forensics, Incident Response, and Threat Hunting
  • 5G Cyber Threat Intelligence
  • Advanced 5G Forensics: Applied to IoT, V2V and Autonomous Things
  • Reverse-Engineering 5G Analysis Tools and Techniques
  • 5G Cyber Security Risk Management
  • 5G Security Automation, Incident Response Team Management
  • Secure DevOps
  • 5G Data Security and Investigations
  • Physical 5G Penetration Testing
  • Physical Wireless Access Control Systems Elements of Design, Offense/Defense
  • 5G Mobile Botnets
  • Bot-masters and Bot-proxies
  • 5G UE Location Tracking

Module 9: 5G Networks and System Cybersecurity Assessment and Best Practices

  • 5G Systems Attacks
  • Uniquely Network Concerns
  • Reliability and Security
  • Role of Obscurity
  • Threat Assessment
  • Attackers and Assets
  • Attack Surface
  • Attack Trees
  • Security Policy
  • 5G System Vulnerabilities
  • Backdoors
  • Denial of Service (DOS)
  • Defensive Architectures
  • Combating Complexity
  • Defensive Hardware Interfaces
  • Public Key Cryptography (PKI)
  • Protecting Data In Motion
  • Secure Software Process

Module 10: 5G System Vulnerability Analysis

  • 5G System and Network Attacks
  • Exploiting 5G Systems and Devices
  • The Stages of System Exploitation
  • Initial Reconnaissance
  • Exploitation
  • Firmware Unpacking and Modification
  • Detecting
  • Extracting
  • Analysis
  • Modification and Creation of new firmware
  • Hacking/exploitation techniques, tools and entry points
  • Defensive technologies

Module 11: Cybersecurity Attacks and Best Mitigation Practices for 5G Systems

  • Non-Invasive Hardware Reverse Engineering
  • Component identification
  • Interface Analysis
  • Communications Protocols Sniffing
  • Decoding and Deciphering Captured Bits
  • Critical Data Identification and Detection
  • Component Removal and Replacement
  • Electronics and Circuit analysis
  • Security Measures

Module 12: 5G Security Requirements and Features

  • 3GPP General security requirements
  • Requirements on the UE
  • Requirements on the gNB
  • Requirements on the ng-eNB
  • Requirements on the AMF
  • Requirements on the SEAF
  • Requirements on the UDM
  • Core network security
  • Trust boundaries
  • Visibility and configurability
  • Requirements for algorithms, and algorithm selection

Module 13: TONEX 5G Security Workshop/Recommendations

  • Key Issues
  • Embedded SIM Security
  • mmWave Security Issues
  • 5G Autonomous Driving Security Solutions
  • Critical 5G Security Controls Planning, Implementing and Auditing
  • Top 5G Mitigation Strategies Implementing and Auditing
  • Advanced 5G Security Principles
  • 5G Intrusion Detection
  • 5G Wireless Hacker Tools, Techniques, Exploits and Incident Handling
  • Issues with Access Network Flash Network Traffic
  • Radio interface key management
  • User plane integrity
  • Security measures
  • DOS Attacks Against Network Infrastructure
  • Overload of the signaling plane security issues
  • Bulk configuration security issues

Module 14: Tonex 5G Cybersecurity Assessment (Workshop using DoD RMF Templates)

  • Evaluate 5G system security vulnerabilities
  • Assessing cyber-related information and control systems to relevant regulations, standards and guidance
  • Gap analysis to unveil security holes
  • real-time situational awareness
  • Insider and external threat protection
  • System hardening and active defenses for comprehensive protection of 5G system 5G environment
  • 5G cybersecurity patching

 

5G Security Training

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.