MENUMENU
Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
event
wp-types-group
research-article
testimonial
Filter by Categories
a) Access Network
All Course Calendar
Archives
b) Core Network
BASIC TRAININGS FOR PROFESSIONALS
BUSINESS & PROJECT MANAGEMENT
c) Certified Technicians
Carrier Ethernet Program
CERTIFICATION PROGRAMMES
CLOUD / DATA CENTRE TECHNOLOGIES
CYBERSECURITY TRAININGS
DATA ANALYTICS
Demo
FIBER OPTICS COMMUNICATIONS TECHNOLOGIES
Forms
INTERNET OF THINGS (IoT)
IP MPLS / TRAFFIC ENGINEERING
IPTV, OTT MEDIA TECHNOLOGIES
LTE / 4G / 5G TECHNOLOGIES
Member
NETWORK OPERATIONS & SUPPORT
NETWORK QoS & OPTIMIZATION
Old content from Joomla
SIP / IMS / ROAMING
Telefocal Certification Programmes
Testimonials
Training Course Calendar
Training Courses
TRANSMISSION TECHNOLOGIES

LTE Security

Understand and explain in-depth the various encryption algorithms used in LTE networks security

Course Overview:

This “LTE Security” course is designed to enable participants understand the security issues surrounding LTE networks. It will list and explain in-depth the various encryption algorithms used in LTE networks so that the participants will have a good understanding of these encryption algorithms.

The course will also dwell into relevant topics to teach the participants how to manage the security keys involved. It will also cover the functions of the PKI architecture components, and include topics to enable participants have a good concept of IPSec over Public Internet as well as Private Backhaul networks.

Key Benefits:

Upon completion of this course, the participants will be able to:

  1. Explain the security bases for LTE networks
  2. List the encryption algorithms
  3. Understand how the LTE security feature groups meet certain threats and accomplish certain security objectives: Network access security, LTE Security Encryption etc
  4. Understand Security Keys Management:
    • Differences between the private and public keys, how to exchange keys with security over the network (using originally algorithms such Deffie-Helmann) and how this drives to certificates and PKI.
  5. Describe the functions of the PKI architecture components
  6. Describe concept for IPSEC over public Internet and Private Backhaul.

Pre-Requisite for Participants:

Attendance on this course assumes knowledge basic GSM/WCDMA/LTE knowledge. An understanding of IP and security procedures would be an advantage.

Who Should Attend?

This course is designed for engineers, managers and other personnel who have a need to acquire a technical overview of the security environment employed within GSM/WCDMA/LTE networks. It will also be of benefit to those in the wider technical community who have a need to understand the security protocols employed by cellular networks.

Course Duration:

3 days

Course Outlines:

  • Introduction to LTE network components and architecture
  • Overview of security concepts
  • Basics on transport security

  • Security keys – 3GPP TS 36.300
  • LTE/EPC Security Procedures
  • Security features in IP Multimedia System

Related Course Topics

4G LTE Signaling, Protocols and Procedures Course Objectives: This training aims to give a comprehensive overview on LTE-specific Signaling Protocols and Procedures. After attending this course, participants will gain knowledge on : Non Access Stratum and Access Stratum Signaling ...
5G Mobile Networks Course Objectives: Upon completion of this course, the participants would be able to: Describe what 5G is. Describe the 5G technology drivers. List the 5G features and their benefits. Describe the 5G network architecture and its key te...
5G Network Design and Planning Course Objectives: This course aims to provide students with necessary skills for planning and performing 5G network design process. Target Audience This course is designed for telecommunications engineers working in the network RF design environm...
An Overview of Cyber Security Course Objectives: After attending this "An Overview of Cyber Security" training, participants will be able to: Describe the principal types of security threat which individual computer users, governments, SMEs and large corporations ar...
Cyber Fundamentals Training with Hands-On Labs Course Overview: The main objectives of this course is to address some fundamentals of Cyber Security topics, and provide insights into the modern security environment. It seeks to explain the cyber threat landscape and attackers' mentality, in...
Telefocal Asia Pte Ltd © www.telefocal.com. All rights reserved. Website Terms & Conditions

Setup Menus in Admin Panel