Overview
The arrival of the 5G mobile wireless network has brought with it new security challenges.
This instructor-led, live training (online or onsite) is aimed at engineers who wish to implement security policies and technologies to secure 5G wireless networks.
By the end of this training, participants will be able to:
- Understand the 5G architecture and the challenges it poses to testing.
- Select and utilize the technology, tools, and applications available for 5G development and testing.
- Implement 5G testing practices to prevent failures at any of the different elements of a 5G network.
- Predict problems and optimize performance of 5G.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Requirements
- An understanding of mobile networks.
- An understanding of basic security concepts.
Audience
- Network engineers
- Mobile network technicians
- Developers
- Mobile architecture professionals
Course Outline
Introduction
- Challenges in 5G Network Testing
Overview of 5G Features and Architecture
- New Radio (NR)
- Millimeter Wave
- Massive MIMO
- Beamforming
- Network Slicing
5G Deployment Phases
- Technology Verification and Validation
- Deployment, Activation and Scaling
- Assurance, Optimization, Monetization
5G Encryption
- Resilience, communication security, identity management, privacy and security assurance.
Case Study: Hacking 5G
Overview of 5G Testing Tools
Developing a Security Plan
Developing a 5G Test Model
5G Penetration Testing
Case Study: Cyberattacks and the Vulnerability of Mobile Networks
Securing Cloud Communications
Securing IoT Devices
Securing Voice over Wi-Fi (VoWiFi)
Ensuring Data Quality for Ground Level Hardware
Monitoring 5G
Case Study: Financial Fraud over Mobile Networks
5G Forensics Analysis
Auditing 5G Security Controls
Automating 5G Security
Controlling 5G Testing Costs
Standardization and Testing Best Practices
Summary and Conclusion