5G Network Security Training

5G Network Security Training

Monday 05 Oct 2020

  • Duration: One Week
  • City: Istanbul
  • Fees: Classroom: 3900 GBP / Online: 1950 GBP

Overview

This course presents old and new threats, security aspects, requirements, and recommendations from various organizations, and then the new, improved functions and procedures designed to improve the security of the future 5G networks for communication with regular users and a growing number of IoT devices.

The course provides a comprehensive grounding in this expanded set of security requirements and mechanisms used in 5G. We start by considering the 5G architecture in order to better understand the overall security requirements for both the UE and network. We then build on the security architecture of 4G LTE, with relevant modifications and additions required for 5G, before focusing squarely on the additional features and procedures required to secure the 5G Core Network (Service Based Interface).

Who should attend?

This course is designed for engineers, managers and other personnel who have a need to acquire a technical overview of the security environment employed within 5G networks. It will also be of benefit to those in the wider technical community who have a need to understand the security protocols employed by advanced cellular networks.

Day 1:

5G Security Overview

Introduction to 5G Networks and Systems

  • 5G 101
  • 5G Communications Overview
  • Channels and Carriers
  • Channelization
  • 5G Access Techniques
  • 5G Services
  • Broadcasting, Mobile and Fixed 5G Service
  • 5G communications systems engineering principals
  • Service and Performance Requirements
  • 5G New Radio (NR)
  • 5G NR FDD/TDD CA
  • Non-Standalone (NSA)
  • Standalone (SA)
  • Evolution of cellular systems
  • Second generation cellular systems
  • Third generation cellular systems
  • Fourth generation cellular systems
  • 5G Mobile networks
  • 5G requirements
  • 5G enabling technologies
  • 5G standardisation activities
  • Mobile networks security landscape
  • Mobile security lifecycle functions
  • Design principles for 5G security
  • Overview of security recommendations and challenges
  • Novel technologies for 5G security
  • Security in SDN-based mobile networks
  • Cyber security business models in 5G
  • The context of cyber security businesses
  • The business model approach
  • The business case of cyber security in the 5G era
  • Business model options in 5G security

Day 2:

5G Network Security

  • Physical layer security
  • WBPLSec system model
  • Outage probability of secrecy capacity of a jamming receiver
  • WBPLSec applied to 5G
  • 5G-WLAN security
  • Introduction to WiFi-5G network interoperability
  • Overview of network architecture for WiFi-5G network interoperability
  • 5G-WiFi security challenges
  • Security consideration for architectural design of WiFi-5G networks
  • LiFi networks
  • Introduction to LiFi-5G network interoperability
  • 5G-LiFi security challenges
  • Security consideration for architectural design of LiFi-5G networks
  • Safety of 5G network physical infrastructures
  • Historical development
  • Structural design philosophy
  • Survey of problems
  • Opportunities and recommendations
  • Customer Edge Switching
  • State-of-the-Art in Mobile Networks Security
  • CES Security Framework
  • Evaluation of CES Security
  • Deployment in 5G Networks
  • Software Defined Security Monitoring in 5G Networks
  • Existing Monitoring Techniques
  • Limitations of Current Monitoring Techniques
  • Use of Monitoring in 5G
  • Software Defined Monitoring Architecture
  • Expected Advantages of Software Defined Monitoring
  • Expected Challenges in Software Defined Monitoring

Day 3:

5G Device and User Security

  • IoT Security
  • Literature Overview and Research Motivations
  • Distributed Security Platform
  • Mobile Cloud Robot Security Scenarios
  • User Privacy, identity & Trust in 5G
  • Background
  • User Privacy
  • Identity Management
  • Trust Models
  • 5G Positioning
  • Outdoor versus Indoor Positioning Technologies
  • Passive versus Active Positioning
  • Overview of 5G Positioning Mechanisms
  • Main Privacy Concerns
  • Passive versus Active Positioning Concepts
  • Physical Layer-based Security Enhancement Mechanisms for Positioning
  • Enhancing Trustworthiness
  • Cryptographic Techniques for Security and Privacy in 5G
  • Landscape of the European and International Projects related to Secure Positioning

Day 4:

5G Cloud and Virtual Network Security

  • Mobile Virtual Network Operators (MVNO) Security
  • Cloudification of the Network Operators
  • MVNO Security
  • TaaS Deployment Security
  • Future Directions
  • NFV and NFV-based Security Services
  • 5G, NFV and Security
  • A Brief introduction to NFV
  • NFV, SDN and a Telco Cloud
  • Common NFV Drivers
  • NFV Security: Challenges and Opportunities
  • NFV-based Security Services
  • Cloud and MEC Security
  • Cloud Computing in 5G Networks

Day 5:

MEC in 5G Networks

  • Security Challenges in 5G Cloud
  • Security Challenges in 5G MEC
  • Security Architecture for 5G Cloud and MEC
  • 5G MEC, Cloud Security Research and Standardisation
  • Regulatory Impact on 5G Security and Privacy
  • Regulatory Objectives for Security and Privacy
  • Legal Framework for Security and Privacy
  • Security and Privacy Issues in New 5G Technologies
  • Relevance Assessment of Security and Privacy Issues for Regulation
  • Analysis of Potential Regulatory Approaches
  • Summary of Issues and Impact of New Technologies on Security and Privacy Regulations
Download WordPress Themes Free
Download WordPress Themes Free
Download WordPress Themes
Download Premium WordPress Themes Free
udemy paid course free download
download micromax firmware
Download WordPress Themes
download udemy paid course for free