Overview of 5G Network Security - Telecontran Limited

Telecontran Limited

sales@telecontran.com

5G Network & Security

Overview of 5G Network Security

2 DAYS

INSTRUCTOR LED WORKSHOP

“OUR COURSES CAN BE SPECIALLY TAILORED TO ADDRESS YOUR REQUIREMENT – TELECONTRAN”

5G Network & Security

COURSE OBJECTIVES

5G envisions a broader range of services supporting an increased number of use cases and applications that leads to increase in consumer use and in turn increase risk in security. As a result, 5G comes in terms of a flexible authentication framework, allowing the use of different types of credentials and enhanced subscriber privacy features. Additional higher protocol layer security mechanisms is used to protect the new service-based architecture of 5G along with integrity protection.

Telecontran’s Workshop on Overview of 5G Network Security presents the security aspects and functions to improve the security of 5G networks with regular users and IoT Devices. This workshop provides a comprehensive grounding of what and how security functions are implemented in the 5G and its network architecture along with in-depth covering of 5G AKA and service based interface security.

After successful completion of this workshop participants will be able to

  • Highlight end to end architecture of 5G Network and the area of 5G that need to be protected.
  • Examine 5G AKA in-depth covering signaling flows as well as API exchange
  • Understand customer edge security issues and security surrounding 5G mobile cloud
  • Sketch various standardized security mechanisms for end-users, mission critical applications as well as IoT devices.

COURSE CURRICULUM

This course is specially designed for Radio Network Planners, Transmission Engineers, Core Network Engineers, Project Managers, RF Engineers & Technicians and frequency spectrum and policy makers from Regulators, who wish to learn the foundation of 5G security in detail as well as to upgrade themselves in the field of 5G security.

Overview of 3GPP 5G Network

  • 5G Drivers
  • Evolution of LTE / 4G to beyond 4G
  • Objectives of 5G
  • The ITU IMT-2020 5G requirement
  • eMBB, URLLC and mMTC
  • 5G Deployment – NSA vs SA
  • 3GPP 5G Architecture – Reference Point vs Service Based
  • 5G Core Network
  • 5G Internet
  • SDN / NFV
  • 5G MEC
  • 5G Network Slicing
  • 5G Carrier Aggregation
  • D2D and V2X

5G Security Threats and Issues

  • Overview of Security Concerns of 2G/3G Technologies Addressed in 5G
  • Major Security Issues
  • 5G Wireless Ethical Hacking
  • General Threats for 5G Network
  • 5G NSA / SA Attack Scenarios
  • Spoofing
  • Data Tampering
  • Repudiation
  • Information Disclosure
  • Denial of Service (DoS)
  • Privilege Elevation
  • Malware in device and servers
  • Threats in 5G Core Network
  • Threats in 5G RAN
  • Threats in 5G Roaming

5G Security Architecture

  • Physical Layer Security in 5G Networks
  • WBPLSec Protocol
  • Customer Edge Switching (CES) Security Framework
  • Threats and Vulnerabilities to 5G Protocol Stack
  • Service Based Interfaces – HTTPS
  • TLS
  • Protecting 5G Service Based Architecture – OAuth 2.0
  • IPSec in 5G
  • Establishment of gNB Security Associations
  • SDN / NFV Security
  • Network Slicing Security – NSSAAF and NSACF
  • Multi Edge Computing (MEC) Security
  • Customer Edge Switching
  • Customer Edge Traversal Protocol (CETP)
  • Roaming Security – Security Edge Protection Proxy, PRINS, IPUPS

5G Device and User Security

  • 5G-WLAN security
  • 5G-WiFi security challenges
  • 5G IoT Security
  • D2D and V2V Security
  • IoT Security
  • User Privacy, identity & Trust in 5G
  • Trust Models
  • Zero Trust
  • 5G Positioning – Outdoor vs Indoor Positioning and Passive vs Active Positioning

5G AKA (Authentication and Key Agreement)

  • 5G Cryptographic Processes
  • 5G Security Algorithms
  • 5G AKA
  • High Level 5G AKA Procedure
  • Generation of 5G-SE-AV
  • Device Authentication
  • Authentication Confirmation
  • SUPI & SUCI

5G Security Functions and Procedures

  • Security for non-3GPP access
  • 5G Non SBA Interfaces security
  • 5G SBA interfaces security
  • 5G Signaling and security – NAS Signaling Security and RRC Signaling Security
  • NWDAF-based anomaly detection
  • Securing UE-AF communication

TRAINING/WORKSHOP

DURATION

TRAINING DATE

LOCATION

Overview of 5G Network Security

2 Days

10th Sep. - 11th Sep. 2023

Dubai, UAE

Overview of 5G Network Security

2 Days

11th Dec. – 12th Dec. 2023

Singapore

OUR HAPPY CLIENTS

WHAT OUR CLIENTS SAY ABOUT TELECONTRAN !!

“PLEASE FEEL FREE TO CONTACT FOR ANY FURTHER DETAILS AT SALES@TELECONTRAN.COM