Skip to main content

5G Cybersecurity Bootcamp - 3GPP Version - Tonex Training


Length: 4 Days

5G Cybersecurity Bootcamp is a combination of theoretical lectures and practical insight that helps participants gain in-depth knowledge about current and future state of 5G mobile technology, architecture, protocols and 5G cybersecurity.

There are many technologies powering what’s become known as the Fourth Industrial Revolution – everything from robotics and artificial intelligence (AI) to virtual reality (VR) and the Internet of Things (IoT).

Listen to 5G Cybersecurity Bootcamp 3GPP Version Podcast


But wireless security experts say that’s not enough and believe there are key 5G protections to zero in on, including:

Detect Anomalies
Stop and Fix Advanced Malware
Prevent Threats
Make Threat Intelligence Paramount
Incorporate DNS Intelligence

Learning Objectives:
Upon the completion of 5G Fundamentals training, attendees will:

Learn the fundamental concepts of 5G system
List and discuss various 5G use cases
Discuss differences and similarities between 5G (Release 16) and 4G LTE-Advanced Pro
Discuss end-to-end 5G network architecture
Describe 5G NR, 5GC: 5G core functions, architecture, AMF, Network Slicing, NG-RAN, SBA, SMF, UPF
SDN/VFN, Network Slicing, MEC, LTE-M, 5G/NB-IoT
Identify 5G operational scenarios, D2D, and signaling
Discuss Security architecture and procedures for 5G systems
Explain 5G security issues, attacks and mitigation

Course Agenda:

Overview of the 5G Mobile Network
The 5G System Survey
5G RAN and Core Architecture Overview
5G Identifiers
5G Evolution of RAN and Core Network
5G Operational Procedures
Device to Device Communication (D2D)
Overview of Security Architecture in 3GPP
Overview of 5G Security Architecture
Security Requirements and Features
Security Procedures between UE and 5G Network Functions
Evolution of the Trust Model
5G Threat Attacks and Surface
5G Security Key Hierarchy
Ciphering Algorithms
Integrity Algorithms
Test Data for the Security Algorithms

Request more information regarding 5G Cybersecurity Bootcamp 3GPP Version - Tonex Training. Visit tonex.com for course and workshop detail.

5G Cybersecurity Bootcamp

Comments

Popular posts from this blog

Requirements Engineering Workshop with Use Cases

Requirements Engineering Workshop with Use Cases, – Model-Based Requirements Engineering with Use Case. Requirements Engineering Workshop with Use Cases, Use Cases portray conceivable communications including a framework and its condition. Use Cases are considered as awesome instruments and powerful means for operational and practical requirements elicitation and investigation.

Car Hacking Course, Kali Linux, Sparkfun CAN Bus Workshop

Car Hacking Automotive Cybersecurity Workshop Course, Featured with Kali Linux, SparkFun CAN Bus.  Latest automotive technology not only thrills, but also kills or causes heavy damages. The automotive industry is working relentlessly on car cyber security. They need to ensure all the mechanisms are working properly. Any vulnerabilities found in automotive technology might lead to several loss. Not only car industry, As a car owner also you require to learn how to stay safe from car hacking.  This course is super recommended for: Automotive software and hardware engineers,  OEM / Car seller / Safety analysts System engineers, Quality engineers Managers responsible for the development and implementation of systems Product development engineers Suppliers whose products contain electronics or software Supplier quality & Functional safety managers Functional safety implementation leaders and senior management. Since 1993, Tonex has been one of the most reliable and popular...
SCADA : Supervisory Control And Data Acquisition Training . Supervisory Control And Data Acquisition (SCADA) Training Courses, Certifications and Education. Learn SCADA from SCADA Experts. SCADA systems and Industrial Control Systems (ICS) help with monitoring and automation of remote equipment sites. SCADA systems run global mission critical infrastructures and systems including power grid, oil and gas, telecom, chemical manufacturing, transportation, water treatment and distribution, wastewater collection and treatment, electrical power transmission and distribution, wind farms, solar farms, civil defense siren systems, and other large communication systems.