Length: 2 Days
Print Friendly, PDF & Email

Fundamentals of 6G and 6G Security Training

Fundamentals of 6G and 6G Security Training is a 2-day course that provides information and insights on the security challenges likely to be confronted by 6G networks as well as possible defenses.

Participants will also learn the basics of 6G to better understand why possible vulnerabilities could occur.

Additionally, attendees will learn about the promise of 6G technology and why it will be extremely important to address security issues in order to maintain innovative applications that should benefit both consumers and commerce.

Fundamentals of 6G and 6G Security Training

Along with the innovative applications 6G technology will deliver, there will also be challenges regarding 6G security issues.

Experts in this area contend that in 6G, a hierarchical security mechanism that differentiates communication security at the sub-network level from sub-network to comprehensive area network security would be preferable.

There are multiple research areas in physical security that will need to be combined to ensure security and privacy in 6G such as the development of distributed, cooperative security protocols as well as preventing attacks using cell-free MIMO and intelligent reflective surfaces.

Also high on the list of 6G security challenges is how to ensure platform security when antennas are distributed in multiple locations and what kind of jamming protection will be available to detect and mitigate against jamming.

There’s also concern regarding threats from Network Openness and threats from Open Source SW.

Additionally, researchers are taking a hard look about what to do in the event of threats from Network AI. By using the characteristics of training and interference of AI, attackers can intentionally fool AI models by entering deceptive data to make network systems unstable, malfunctioning or unavailable, which is called Adversarial Machine Learning (AML).

The hope is that AI security technologies and the adoption of post-quantum cryptography can help make 6G networks more secure.

Who Should Attend

Fundamentals of 6G and 6G Security Training is a 2-day course designed for:

  • Anyone involved in 6G product development
  • Anyone involved in 6G network analysis or planning
  • Anyone involved in 6G design or engineering
  • Professionals who want to upgrade their skills to 6G
  • Anyone else who wants to learn latest telecom technologies and wants to work for telecom mobile operator and vendor companies
  • Cybersecurity analysts and professionals working in both red and blue teams

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.