UMTS/HSPA/HSPA+ and LTE Security Training
Introduction:
UMTS/HSPA/HSPA+ and LTE Security Training Course by ENO
Having completed this UMTS/HSPA/HSPA+ and LTE Security Training course the participant will be able to understand how security is implemented, deployed and managed in UMTS/HSPA/HSPA+and LET networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented.
Customize It:
With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.
Related Courses:
Duration: 2 days
Objectives:
Having completed this course the participant will be able to understand how security is implemented, deployed and managed in UMTS/HSPA/HSPA+and LET networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented.
Course Content:
Overview of Security Concepts
◾Basic security concepts
◾Authentication
◾Privacy
◾Integrity
◾Authorization
◾Non-repudiation
Encryption Fundamentals
◾Encryption Technologies
◾Cryptography Keys
◾Symmetric and Asymmetric
◾Ciphers
◾Cipher Suites
◾Certificates
Overview of Wireless Security Requirements
◾Wireless security needs
◾Basic GSM, GPRS and UMTS security functions
UMTS Security Architecture
◾Overview of UMTS Network
◾Overview of HSPA/HSPA+
◾UMTS security features
◾Network access mechanisms
◾UMTS authentication and authorization procedures
◾Key agreement
◾Local authentication
◾UMTS ciphering procedures
◾Security threats to UMTS
◾Security Evolution in E-UTRAN/LTE and EPC
Security in UTRAN
◾Typical threats in UTRAN
◾Mutual authentication
◾Cryptography for authentication
◾UTRAN encryption
◾Integrity protection of RRC signalling
◾Security in E-UTRAN
Security in UMTS Core Network
◾Typical Threats in Core Network
◾Denial of Services
◾IPSec
◾Authentication Server
◾Network Domain
◾MAP application layer security
UMTS Authentication and Key Management (AKA)
◾Authentication parameters
◾AV and K
◾RAND
◾SQN and AK
◾AMF and MAC
◾CK and IK
◾RES and X-RES
◾AUTN and AUTS
◾Normal AKA procedure
◾AKA procedure in the AuC
◾AKA procedure in the USIM
◾AKA procedure in the VLR/SGSN
AKA Algorithms
◾AKA Functions with their outputs
◾Cryptographic functions and algorithms
◾Key generating functions
◾Authentication parameters
◾Integrity function
◾Confidentiality function
◾f0, f1 and f1*
◾f2, f3 and f4
◾f5, f5*, f8 and f9
Request More Information