LTE Security Training

LTE Security Training


LTE Security Training Course Description

LTE Security Training discusses how LTE/E-UTRAN and EPC security substantially extends GSM, 3G/UMTS, and IMS security. LTE security training also encompasses the E-UTRAN, EPC and IMS security architectural. LTE Security Training course presents in detail the security mechanisms employed to meet current and future LTE requirements.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

LTE Security TrainingRelated Courses:

Duration: 1-2 days


◾Shows how GSM and 3G/UMTS security was enhanced and extended to meet the requirements of LTE and ◾LTE/Advanced fourth generation systems
◾Shows concepts behind LTE/E-UTRAN, LTE-Advanced, EPC, IMS and Voice over LTE (VoLTE) Security
◾Explains why LTE security solutions are designed

Course Content:

◾Evolution of Cellular Systems from GSM to LTE-Advanced
◾Introduction to LTE and LTE-Advanced
◾Basic Security Concepts
◾Basic Cryptographic Concepts
◾Principles of GSM Security
◾GSM Cryptographic Algorithms
◾Principles of Third-Generation (3G) Security
◾UMTS Cryptographic Algorithms
◾3G–WLAN Interworking
◾Generic Bootstrapping Architecture (GBA /GAA)
◾Security Mechanisms of 3G–WLAN Interworking
◾Cryptographic Algorithms for 3G–WLAN Interworking
◾EPS Security Architecture
◾Requirements and Features of EPS Security
◾EPS Authentication and Key Agreement (AKA)
◾EPS Authentication and Key Agreement Procedure
◾Key Hierarchy
◾EPS Protection for Signaling and User Data
◾NAS Signaling Protection
◾AS Signaling and User Data Protection
◾The AS (RRC and UP) and NAS Security
◾NAS and AS protection keys
◾The eNB cryptographically keys
◾NAS (EPC/UE) level AKA procedure (KASME)
◾key identifier (KSIASME)
◾Certificate Enrolment for Base Stations
◾Security in Intra-LTE State Transitions and Mobility
◾Transitions to and from Registered State
◾Periodic Local Authentication Procedure
◾EPS Cryptographic Algorithms
◾Ciphering Algorithms and Keys
◾Integrity Algorithms and Keys
◾Key Derivation Algorithms
◾Interworking Security between EPS and Other Systems
◾Security for IMS and Voice over LTE (VoLTE)
◾IMS (Signaling and Media) security
◾Rich Communication Suite (RCS) and Voice over LTE
◾Security for Home Base Station Deployment
◾Closed Subscriber Groups and Emergency Call Handling

Request More Information

    Time Frame: 0-3 Months4-12 Months

    Print Friendly, PDF & Email