The 5G Network Security Training
Length:
Type:
Available Dates
Course Details
- Introduction
- Objective
- Who should attend
5G has the potential to make the world much more connected. Devices in locations without access to traditional broadband networks can be deployed using 5G network connectivity. Higher speeds, lower latency, and increased capacity also make it a potential option for devices where 4G LTE was not a viable option. However, with this growth in systems connected to 5G networks also comes potential security implications. Businesses deploying 5G-connected devices need security solutions capable of monitoring and securing them against cyber threats.
5G Network Security Training course presents old and new threats, security aspects, requirements, and recommendations from various organizations, and then the new, improved functions and procedures designed to improve the security of the future 5G networks for communication with regular users and a growing number of IoT devices.
The course provides a comprehensive grounding in this expanded set of security requirements and mechanisms used in 5G. We start by considering the 5G architecture in order to better understand the overall security requirements for both the UE and network. We then build on the security architecture of 4G LTE, with relevant modifications and additions required for 5G, before focusing squarely on the additional features and procedures required to secure the 5G Core Network (Service Based Interface).
Course Outline
Introduction to 5G Networks and Systems
- 5G Communications Overview
- Channels and Carriers
- Channelization
- 5G Access Techniques
- 5G Services
- Broadcasting, Mobile and Fixed 5G Service
- 5G communications systems engineering principals
- Service and Performance Requirements
Course Video