Length: 2 Days
Print Friendly, PDF & Email

Fundamentals of 5G and 5G Security Training

Fundamentals of 5G and 5G Security Training is a 2-day overview of 5G networks and 5G security key principles and architecture.

Who Should Attend

This course is designed for  systems engineers, hardware and software engineers, managers, and employees with little or no 5G or 5G security experience. The course is also useful for those who have experience with 5G or 5G security but have never had any formal training on the standard.

What You Will Learn

  • An overview of 5G and 5G security
  • 5G use cases, radio, core architecture, and Service-Based Architecture principles
  • A summary of 5G use cases and applications
  • 5G radio access network, core network, and application servers
  • How to implement security on a 5G network
  • Overview of 5G confidentiality, integrity, authentication, intrusion detection and prevention
  • Discuss security for end-user, mission critical applications and IoT devices
  • 5G attack vectors and security key hierarchy
  • Overview of ENISA 5G threat landscape.

Course Content

Introduction to 5G Networks and Systems

  • 5G 101 (use cases, applications, etc.)
  • 3GPP 5G-NR
  • Channels and Carriers
  • 5G Access Techniques
  • 5G Services
  • 5G NR Standalone (NSA) vs. 5G NR Non-Standalone (SA)
  • 5G Identifiers
  • 5G Operational Procedures
  • Device to Device Communication (D2D)

5G Network, System Architecture and Protocols

  • 5G architectural components
  • 5G system performance
  • The 5G System survey
  • Principles of 5G Core (5GC)
  • Service-Based Architecture (SBA)
  • Network slicing
  • NFV and SDN
  • Multi-Access Edge Computing (MEC)
  • HTTP/JASON Interfaces

Introduction to 5G Security

  • RAN and core network security
  • Trust boundaries
  • Visibility and configurability
  • Requirements for algorithms, and algorithm selection
  • 5G systems attacks
  • 5G system vulnerabilities

5G System Vulnerability Analysis

  • 5G system and network attacks
  • Exploiting 5G systems and devices
  • Evaluate 5G system security vulnerabilities
  • Key Issues
  • Embedded SIM Security
  • 5G Autonomous Driving Security Solutions
  • Critical 5G Security Controls Planning, Implementing and Auditing
  • Top 5G Mitigation Strategies Implementing and Auditing

Advanced 5G Security Principles

  • 5G Intrusion Detection
  • 5G Hacker Tools, Techniques, Exploits and Incident Handling
  • Issues with Access Network Flash Network Traffic
  • Radio interface key management
  • User plane integrity
  • Security measures
  • DOS Attacks Against Network Infrastructure
  • Overload of the signaling plane security issues
  • Bulk configuration security issues
  • 5G Security Domains
  • 5G Security Requirements from 3GPP
  • 5G IoT Exploitation
  • 5G Cloud RAN Exploitation
  • 5G SBA/HTTP2/JSON/REST API Exploitation
  • Security Enforcement Points
  • 5G Architecture (RAN, IP Core, Mobile Core, Transport, Etc.)
  • 5G Pen Test Planning
  • 5G Pen Test Scoping, and Recon

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.