UMTS/HSPA/HSPA+ and LTE Security Training

UMTS/HSPA/HSPA+ and LTE Security Training

Introduction:

UMTS/HSPA/HSPA+ and LTE Security Training Course by ENO

Having completed this UMTS/HSPA/HSPA+ and LTE Security Training course the participant will be able to understand how security is implemented, deployed and managed in UMTS/HSPA/HSPA+and LET networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

UMTS/HSPA/HSPA+ and LTE Security TrainingRelated Courses:

Duration: 2 days

Objectives:

Having completed this course the participant will be able to understand how security is implemented, deployed and managed in UMTS/HSPA/HSPA+and LET networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented.

Course Content:

Overview of Security Concepts
◾Basic security concepts
◾Authentication
◾Privacy
◾Integrity
◾Authorization
◾Non-repudiation

Encryption Fundamentals
◾Encryption Technologies
◾Cryptography Keys
◾Symmetric and Asymmetric
◾Ciphers
◾Cipher Suites
◾Certificates

Overview of Wireless Security Requirements
◾Wireless security needs
◾Basic GSM, GPRS and UMTS security functions

UMTS Security Architecture
◾Overview of UMTS Network
◾Overview of HSPA/HSPA+
◾UMTS security features
◾Network access mechanisms
◾UMTS authentication and authorization procedures
◾Key agreement
◾Local authentication
◾UMTS ciphering procedures
◾Security threats to UMTS
◾Security Evolution in E-UTRAN/LTE and EPC

Security in UTRAN
◾Typical threats in UTRAN
◾Mutual authentication
◾Cryptography for authentication
◾UTRAN encryption
◾Integrity protection of RRC signalling
◾Security in E-UTRAN

Security in UMTS Core Network
◾Typical Threats in Core Network
◾Denial of Services
◾IPSec
◾Authentication Server
◾Network Domain
◾MAP application layer security

UMTS Authentication and Key Management (AKA)
◾Authentication parameters
◾AV and K
◾RAND
◾SQN and AK
◾AMF and MAC
◾CK and IK
◾RES and X-RES
◾AUTN and AUTS
◾Normal AKA procedure
◾AKA procedure in the AuC
◾AKA procedure in the USIM
◾AKA procedure in the VLR/SGSN

AKA Algorithms
◾AKA Functions with their outputs
◾Cryptographic functions and algorithms
◾Key generating functions
◾Authentication parameters
◾Integrity function
◾Confidentiality function
◾f0, f1 and f1*
◾f2, f3 and f4
◾f5, f5*, f8 and f9

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment