5G Wireless Security Training

5G Wireless Security Training

Introduction:

5G Wireless Security Training - Hands-on

5G Wireless Security Training is an essential element in the development of security policies and technologies to protect 5G wireless networks from hacking, cyber attacks and financial fraud.

Duration: 5 days

5G Wireless Security Training

5G Wireless Security TrainingRelated Courses:

Customize It:

» If you are familiar with some aspects of this 5G Wireless Security Training course, we can omit or shorten their discussion.
» We can adjust the emphasis placed on the various topics or build the 5G Wireless Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
» If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the 5G Wireless Security Training course in manner understandable to lay audiences.

5G Wireless Security Training - Course Syllabus:

5G Security Training Essentials Bootcamp Style

Intro to 5G Security
5G communications systems architecture
Security Issues and Challenges in 5G Communications Systems
Mobile Malware Attacks Targeting UE
ITU-T and 3GPP Security Frameworks
LTE, LTE-Advanced and LTE-Pro Security Principles
LTE-U and LAA Security
802.11ax Security applied to 5G
802.11ah Security applied to 5G
802.11ay Security applied to 5G
Self-Organizing Network (SON)
Voice over WiFi (VoWiFi) Security
LTE Direct and D2D Communication Security
IoT Security
NFV Security
Software Defined Networking (SDN) Security
Cloud and Virtualization Security
C-RAN Security
V2V Security
Securing 5G Automation
5G Monitoring and Security Operations
Cloud Security applied to 5G
LTE-Advanced, LTE-Pro and 5G Network Penetration Testing and Ethical Hacking
Active 5G Defense, Offensive Countermeasures and Cyber Deception
5G RAN and NexGen Core Network Penetration Testing and Ethical Hacking
IMS Security
Implementing and Auditing 5G Security Controls
Social Engineering for 5G Penetration Testers
5G UE Security and Ethical Hacking
5G Virtualization and Private Cloud Security
5G Wireless Ethical Hacking, Penetration Testing, and Defenses
Advanced LTE, LTE-Advanced ,LTE-Advanced Pro, and 5G Exploit Development for Penetration Testers
5G Forensics Analysis
Advanced 5G Forensics, Incident Response, and Threat Hunting
5G Cyber Threat Intelligence
Advanced 5G Forensics: Applied to IoT, V2V and Autonomous Things
Reverse-Engineering 5G Analysis Tools and Techniques
5G Cyber Security Risk Management
5G Security Automation, Incident Response Team Management
Secure DevOps
5G Data Security and Investigations
Physical 5G Penetration Testing
Physical Wireless Access Control Systems Elements of Design, Offense/Defense
5G Mobile Botnets
Bot-masters and Bot-proxies
5G UE Location Tracking

5G Security Training Workshop/Recommendations

Key Issues
Embedded SIM Security
mmWave Security Issues
5G Autonomous Driving Security Solutions
Critical 5G Security Controls Planning, Implementing and Auditing
Top 5G Mitigation Strategies Implementing and Auditing
Advanced 5G Security Principles
5G Intrusion Detection
5G Wireless Hacker Tools, Techniques, Exploits and Incident Handling
Issues with Access Network Flash Network Traffic
Radio interface key management
User plane integrity
Security measures
DOS Attacks Against Network Infrastructure
Overload of the signaling plane security issues
Bulk configuration security issues

Request More Information

Time Frame: 0-3 Months4-12 Months

Comments are closed.