Price: $1,799.00

Length: 2 Days
Print Friendly, PDF & Email

LTE Security Training Course Description

Integrated-Network-SoS

LTE Security Training discusses how LTE/E-UTRAN and EPC security substantially extends GSM, 3G/UMTS, and  IMS security. LTE security training also encompasses the E-UTRAN, EPC and IMS security architectural.

LTE Security Training course presents in detail the security mechanisms employed to meet current and future LTE requirements.

Instructors are leading experts and industry consultants who participated in decisively shaping LTE/EPC/IMS security in the relevant standardization bodies. Network Access Security, Network Domain Security, User Domain Security, Application Domain Security  User Configuration and Visibility of Security are discussed as part of LTE Security Framework.

Some of the basics learning highlights:

  • Shows how GSM and 3G/UMTS security was enhanced and extended to meet the requirements of LTE and LTE/Advanced fourth generation systems
  • Shows concepts behind LTE/E-UTRAN, LTE-Advanced, EPC, IMS and Voice over LTE (VoLTE) Security
  • Explains why LTE security solutions are designed

Labs/hands-on practices: 2

Scenarios & Use-cases: 2

Key objectives & gained skill: The goal of this course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in the LTE, LTE advanced radio and core network. The course focuses both on the air interface and the core network security principles, vulnerabilities, attack vectors and mitigation.

Topics Included:

  • Evolution of Cellular Systems from GSM to LTE-Advanced
  • Introduction to LTE and LTE-Advanced
  • Basic Security Concepts
  • Basic Cryptographic Concepts
  • Principles of GSM Security
  • GSM Cryptographic Algorithms
  • Principles of Third-Generation (3G) Security
  • UMTS Cryptographic Algorithms
  • 3G–WLAN Interworking
  • Generic Bootstrapping Architecture (GBA /GAA)
  • Security Mechanisms of 3G–WLAN Interworking
  • Cryptographic Algorithms for 3G–WLAN Interworking
  • EPS Security Architecture
  • Requirements and Features of EPS Security
  • EPS Authentication and Key Agreement (AKA)
  • EPS Authentication and Key Agreement Procedure
  • Key Hierarchy
  • EPS Protection for Signaling and User Data
  • NAS Signaling Protection
  • AS Signaling and User Data Protection
  • The AS (RRC and UP) and NAS Security
  • NAS and AS protection keys
  • The eNB cryptographically  keys
  • NAS (EPC/UE) level AKA procedure (KASME)
  • key identifier (KSIASME)
  • Certificate Enrolment for Base Stations
  • Security in Intra-LTE State Transitions and Mobility
  • Transitions to and from Registered State
  • Periodic Local Authentication Procedure
  • EPS Cryptographic Algorithms
  • Ciphering Algorithms and Keys
  • Integrity Algorithms and Keys
  • Key Derivation Algorithms
  • Interworking Security between EPS and Other Systems
  • Security for IMS and Voice over LTE (VoLTE)
  • IMS (Signaling and Media) security
  • Rich Communication Suite (RCS) and Voice over LTE
  • Security for Home Base Station Deployment
  • Closed Subscriber Groups and Emergency Call Handling

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.