5G Security Considerations & Guidelines

5 Day Course
Code PWS273

Book Now - 3 Delivery Methods Available:

Scheduled Virtual Onsite

Overview

Although security models of 3G and 4G networks based on Universal SIM cards worked well, 5G security cannot be a carbon copy of existing designs, due to new requirements. Initially, the main motivation for security in cellular networks was the correct functioning of the billing system, followed by encryption of the radio interface.

Location and identity privacy of the user were also supported, followed by two‐way authentication in 3G to prevent fake base stations. 4G added state‐of‐the‐art cryptographic protocols and protection of physical tampering with the base stations, which could be installed on user premises.

While all those security properties are still valid, 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission‐critical applications.This course investigates the new security messages and threats liable to encountered within the 5G ecosystem.

Objectives

Upon completion of this course the delegate will be able to:

  • Describe typical mobile access authentication methods
  • Describe the 5G enablers
  • Understand the Novel technologies for 5G security
  • Describe the WBPLSec system model
  • Describe LiFi technology
  • Describe Software Defined Monitoring architecture
  • Understand IoT security requirements
  • Understand security issues surrounding positioning technologies
  • Understand customer edge security issues
  • Understand the security issues within the MVNO environments
  • Understand security surrounding Mobile Cloud

Target Audience

Engineers requiring an understanding of the standard and unique requirements the 5G environment security considerations.

Modules

Hide all

5G Security Overview (10 topics)

  • Evolution of cellular systems
  • Second generation cellular systems
  • Third generation cellular systems
  • Fourth generation cellular systems
  • 5G Mobile networks
  • 5G requirements
  • 5G enabling technologies
  • 5G standardisation activities
  • Mobile networks security landscape
  • Mobile security lifecycle functions
  • Design principles for 5G security
  • Overview of security recommendations and challenges
  • Novel technologies for 5G security
  • Security in SDN-based mobile networks
  • Cyber security business models in 5G
  • The context of cyber security businesses
  • The business model approach
  • The business case of cyber security in the 5G era
  • Business model options in 5G security

5G Network Security (15 topics)

  • Physical layer security
  • WBPLSec system model
  • Outage probability of secrecy capacity of a jamming receiver
  • WBPLSec applied to 5G
  • 5G-WLAN security
  • Introduction to WiFi-5G network interoperability
  • Overview of network architecture for WiFi-5G network interoperability
  • 5G-WiFi security challenges
  • Security consideration for architectural design of WiFi-5G networks
  • LiFi networks
  • Introduction to LiFi-5G network interoperability
  • 5G-LiFi security challenges
  • Security consideration for architectural design of LiFi-5G networks
  • Safety of 5G network physical infrastructures
  • Historical development
  • Structural design philosophy
  • Survey of problems
  • Opportunities and recommendations
  • Customer Edge Switching
  • State-of-the-Art in Mobile Networks Security
  • CES Security Framework
  • Evaluation of CES Security
  • Deployment in 5G Networks
  • Software Defined Security Monitoring in 5G Networks
  • Existing Monitoring Techniques
  • Limitations of Current Monitoring Techniques
  • Use of Monitoring in 5G
  • Software Defined Monitoring Architecture
  • Expected Advantages of Software Defined Monitoring
  • Expected Challenges in Software Defined Monitoring

5G Device and User Security (10 topics)

  • IoT Security
  • Literature Overview and Research Motivations
  • Distributed Security Platform
  • Mobile Cloud Robot Security Scenarios
  • User Privacy, identity & Trust in 5G
  • Background
  • User Privacy
  • Identity Management
  • Trust Models
  • 5G Positioning
  • Outdoor versus Indoor Positioning Technologies
  • Passive versus Active Positioning
  • Overview of 5G Positioning Mechanisms
  • Main Privacy Concerns
  • Passive versus Active Positioning Concepts
  • Physical Layer-based Security Enhancement Mechanisms for Positioning
  • Enhancing Trustworthiness
  • Cryptographic Techniques for Security and Privacy in 5G
  • Landscape of the European and International Projects related to Secure Positioning

5G Cloud and Virtual Network Security (13 topics)

  • Mobile Virtual Network Operators (MVNO) Security
  • Cloudification of the Network Operators
  • MVNO Security
  • TaaS Deployment Security
  • Future Directions
  • NFV and NFV-based Security Services
  • 5G, NFV and Security
  • A Brief introduction to NFV
  • NFV, SDN and a Telco Cloud
  • Common NFV Drivers
  • NFV Security: Challenges and Opportunities
  • NFV-based Security Services
  • Cloud and MEC Security
  • Cloud Computing in 5G Networks
  • MEC in 5G Networks
  • Security Challenges in 5G Cloud
  • Security Challenges in 5G MEC
  • Security Architecture for 5G Cloud and MEC
  • 5G MEC, Cloud Security Research and Standardisation
  • Regulatory Impact on 5G Security and Privacy
  • Regulatory Objectives for Security and Privacy
  • Legal Framework for Security and Privacy
  • Security and Privacy Issues in New 5G Technologies
  • Relevance Assessment of Security and Privacy Issues for Regulation
  • Analysis of Potential Regulatory Approaches
  • Summary of Issues and Impact of New Technologies on Security and Privacy Regulations

Scheduled Dates

Please select from the dates below to make an enquiry or booking.

Pricing

Different pricing structures are available including special offers. These include early bird, late availability, multi-place, corporate volume and self-funding rates. Please arrange a discussion with a training advisor to discover your most cost effective option.

Code Location Duration Price Aug Sep Oct Nov Dec Jan
PWS273

(Classroom or Virtual)
5 Days $2,995
PWS273 5 Days $2,995
PWS273
Dubai
(Classroom or Virtual)
5 Days $2,995
PWS273
Dubai
5 Days $2,995
PWS273

(Classroom or Virtual)
5 Days $2,995
PWS273 5 Days $2,995
PWS273

(Classroom or Virtual)
5 Days $2,995
PWS273
Mexico City
(Classroom or Virtual)
5 Days $2,995
19-23
PWS273

(Classroom or Virtual)
5 Days $2,995
19-23
PWS273
Rio de Janeiro
(Classroom or Virtual)
5 Days $2,995
PWS273

(Classroom or Virtual)
5 Days $2,995
PWS273

(Classroom or Virtual)
5 Days $2,995
PWS273
Tel Aviv
(Classroom or Virtual)
5 Days $2,995

What Our Customers Say

The training was delivered with a high level of expertise and excellence. Instructor was highly knowledgeable.”

Technical Trainer, Aviat Networks

Overall the course was really good, the trainer really understood the material and was very approachable.”

Customer Training Manager, Aviat Networks

Excellent course, informative and well-paced.”

CSE, Cisco

Course was very well outlined. Topics were great and bridged many gaps.”

System Engineer, Cable & Wireless

An excellent intro to video encoding & MPEG transport streams - I would definitely recommend it.”

Broadcast Engineer, Cisco

Definitely an excellent intro. Left me interested in learning more.”

Broadcast Engineer, Eircom

Excellent training course with real examples and practical classroom demonstrations.”

Transport Designer, Orange

Instructor knowledge and experience was excellent.”

Solutions Engineer, Akamai

Excellent course, very clear and well organised. Course content delivery was very good.”

Assistant Engineer, Dhiraagu

Very informative and appropriate.”

Network Support Technician, BT

Course PDF

Print

Share this Course

+1
Share

Recommend this Course

Sections