Overview
Class mode: VIRTUAL LIVE STREAM
Ask us about upcoming dates!
With the growth in 5G proof-of-concepts and early deployment, 5G market adoption and usage direction are increasing and being set in place as operators prepare for massive deployment.
This 5G Training Session (TS-501) will help security and telecom professionals get an understanding of the key concepts of 5G, their security, the implementation of such architectures and the impact in terms of related risks.
All trainees will receive the full deck of the training materials at the conclusion of the session.
Key Learning Objectives
- Gain a thorough undestanding of 5G architectures and respective deployment options
- Learn system and infrastructure level deployments, danger areas and security principles
- Understand security impacts of new 5G protocols
- Evaluating risks and attacks on isolation in a multi-tenant environment
Prerequisite Knowledge
- Good knowledge of 4G architectures and security (LTE & EPC)
- Basic knowledge of telecom & network principles:
- What is 2G, 3G;
- OSI network layers;
- Basic knowledge of telecom technologies.
- Good knowledge and usage of Wireshark
Hardware / Software Requirements
Agenda
Expand AllIntroduction
Overview
5G Architectures
Different architectures and impact on security
5G Components
Components of 5G deployments and danger areas
5G Domain Security
Overview
5G Phase 1: Non-Standalone Architecture (NSA) and Security
o 5G Non-Standalone Architectures: EN-DC
o Evolution of the S1 and X2 E-UTRAN interfaces
5G RAN and Virtualized RAN
o 5G New Radio interface
o gNodeB modularity, virtualization and deployment options
5G UE
UE, Handsets and SoCs
5G System Security Principles applied to 5G subscribers
o Anonymization of subscriber’s fixed identity
o Authentication and Key Agreement (AKA)
o Encryption and integrity protection of control-plane and
user-plane traffic
o Activation of the security and related signalling procedures
Impact of new 5G protocols in term of security:
o X2 extensions for NSA deployment
o F1, E1, Xn and N2 / N3
o PFCP and SBI (Service-Based Interface)
5G Core
5G Core, Service Based Architecture (SBA), Roaming and Interconnect Security
Infrastructure level deployment
Deployment, security & risk of NFV (Network Functions Virtualisation)
5G Slicing
Benefit and risk of 5G slicing in term of Security
5G Multi-tenant Environment
Understand the risks and attacks on isolation in a 5G multi-tenant environment (Slicing, NFV, SDN)
5G Testbeds
5G testbeds, network stacks and open-source software
Exercises
Hands-on questions and exercises
Closing Remarks
Debrief