3-Day Training | 15-17 Nov

[HITB CYBERWEEK] TS-501 5G Telecom Security Hands-On

  • Benoit Michaud R&D Engineer,
    P1 Security
Duration 3 days
Capacity 15 pax
Seats Available 15
Difficulty beginner

$4,299.00 $3,299.00

Register Now

Overview

Class mode: VIRTUAL LIVE STREAM 


DATE: 15 – 17 November 2020

TIME: 09:00 to 18:00 CET

 

With the growth in 5G proof-of-concepts and early deployment, 5G market adoption and usage direction are increasing and being set in place as operators prepare for massive deployment.

This 5G Training Session (TS-501) will help security and telecom professionals get an understanding of the key concepts of 5G, their security, the implementation of such architectures and the impact in terms of related risks.

All trainees will receive the full deck of the training materials at the conclusion of the session.

Key Learning Objectives

  • Gain a thorough undestanding of 5G architectures and respective deployment options
  • Learn system and infrastructure level deployments, danger areas and security principles
  • Understand security impacts of new 5G protocols
  • Evaluating risks and attacks on isolation in a multi-tenant environment

Prerequisite Knowledge

  • Good knowledge of 4G architectures and security (LTE & EPC)
  • Basic knowledge of telecom & network principles:
    • What is 2G, 3G;
    • OSI network layers;
    • Basic knowledge of telecom technologies.
  • Good knowledge and usage of Wireshark

Hardware / Software Requirements

 

 

Agenda

Expand All

Introduction

Overview

5G Architectures

Different architectures and impact on security

5G Components

Components of 5G deployments and danger areas

5G Domain Security

Overview

5G Phase 1: Non-Standalone Architecture (NSA) and Security

o 5G Non-Standalone Architectures: EN-DC
o Evolution of the S1 and X2 E-UTRAN interfaces

5G RAN and Virtualized RAN

o 5G New Radio interface
o gNodeB modularity, virtualization and deployment options

5G UE

UE, Handsets and SoCs

5G System Security Principles applied to 5G subscribers

o Anonymization of subscriber’s fixed identity
o Authentication and Key Agreement (AKA)
o Encryption and integrity protection of control-plane and
user-plane traffic
o Activation of the security and related signalling procedures

Impact of new 5G protocols in term of security:

o X2 extensions for NSA deployment
o F1, E1, Xn and N2 / N3
o PFCP and SBI (Service-Based Interface)

5G Core

5G Core, Service Based Architecture (SBA), Roaming and Interconnect Security

Infrastructure level deployment

Deployment, security & risk of NFV (Network Functions Virtualisation)

5G Slicing

Benefit and risk of 5G slicing in term of Security

5G Multi-tenant Environment

Understand the risks and attacks on isolation in a 5G multi-tenant environment (Slicing, NFV, SDN)

5G Testbeds

5G testbeds, network stacks and open-source software

Exercises

Hands-on questions and exercises

Closing Remarks

Debrief

Sign Up For an Account

to track your favorites

Sign Up

Want a Training Not Seen Here?

Write to Us

Contact Us