Secure global 5g network

This course will discuss 5G security in three key areas from a high-level perspective. First, an overview of the 5G architecture, 5G use cases, and the threats that 5G technologies pose will be covered. Next, participants will be guided through the 5G security framework which supports different devices and implementations. Lastly, security features of 3GPP related to the 5G security framework and the security mechanisms related to 5G transport will be discussed.

As this is a one-day course, the 5G mechanisms and algorithms will be simplified to allow participants to focus clearly on the important areas of 5G security. More specifically, they will learn how 5G improves security in data storage and data transmission.

  • Managers and executives
  • Non-technical government personnel
  • Professionals who wish to improve their understanding on 5G networks security
Instructor-led Training
  • LIVE Virtual: 1 day

24 Feb 2023 (Fri), GMT +08:00
7 Jul 2023 (Fri), GMT +08:00
If you are keen on attending any of the above scheduled courses, please register your interest via our course enquiry form.

At the end of this course, participants will learn:

  • Identify and understand 5G security drivers, threats, and requirements
  • List the elements of a 5G security architecture
  • Identify the security concerns and vulnerabilities of 5G
  • Recognise the security measures required for 5G
  1. 5G Network Overview
  • 5G Use Cases
  • 5G Architecture
  • 5G Main Mechanisms
  1. 5G Security Drivers
  • Major 5G Security Issues
  • Status in 5G Security Standardization: 3GPP
  • Challenges for Operators
  • Challenges for Verticals
  1. 3GPP Security Features
  • SEAF / ARPF
  • Authentication Protocols
  • Key Hierarchy
  • SUPI and SUCI
  • Inter Operator Network Security
  1. 5G Infrastructure Security Principles
  • SDN and NFV security
  • Network Function Virtualization Security
  • Isolation and Traffic Separation in the Telco Cloud
  • Cloud and MEC Security
  • 5G Cloud Computing Architecture
  • Five Immutable Laws of Virtualization Security
  • Centralized Security Architectures
  • Customer Edge Switching
  • Customer Edge Traversal Protocol (CETP)
  • Network Slice Isolation – The Crucial Slicing Security Aspect

Note: A Certificate of Completion will only be issued upon achieving at least 75% attendance for the course.

Enrolled: 0 students
Duration: Classroom/LIVE Virtual: 1 day
Level: Virtual Training

Upcoming Classes

You cannot copy content of this page