5G NETWORK SECURITY TRAINING

                                          English and Arabic 

5 Days Course

OVERVIEW

Evolve your skills and competencies to seize the potential that 5G offers!

 

Start your 5G journey on the right path with Xceed’s comprehensive portfolio of training and certification programs. Xceed’s End-to-End 5G solution brings all the necessary elements together to ensure your 5G success.

 

Whether you are a business leader, technology professional, University student, network operator or network engineer, Xceed Academy has a 5G learning solution for you. This rich suite of learning and certification programs are designed to equip networking operations, engineering and planning resources with the knowledge and hands-on skills required to plan, design, operate and maintain 5G networks.

 

Master the necessary knowledge and skills within your organization to evolve to 5G with confidence and accelerate your time to market.

 

As the 5G rollouts gain momentum and enterprises begin assessing use cases for deploying new networks, securing them and their connected devices shouldn’t be an afterthought. Although 5G has been designed from the ground up with security at the forefront, it is not entirely secure

 

As we transition to the new reality, the ideal cybersecurity training solutions aims to meet end-to-end security demands in entire enterprise networks. As a data-centric enterprise network, 5G is expected to bring dramatic changes to IT and completely new management assets for enterprises with IoT.

 

Our trainings for 5G and IoT security protects the end users who use new technologies and the partners who deploy them, enabling secure information exchange in a connected world.

LEARNING OUTCOMES

5G Security: Basics, Aspects, Threats

 

  • What is security: confidentiality, integrity, identity protection, intrusion prevention, etc.
  • Security aspects of end-user and IoT devices, radio access network, core network, application servers and communication with other networks.
  • 5G system introduction: architecture, relation to 4G networks, selected deployment scenarios, use cases, Service-Based Architecture principles, Centralized RAN option.
  • Possible attack vectors: malware in devices/app servers, misbehaving UEs, compromised base stations, fake base stations, passive air interface monitoring, active interception, physical tampering with IoT devices, etc.

 

Requirements and Recommendations

 

  • 3GPP 5G security requirements on UE, gNB, Centralized RAN, AMF, UDM, AUSF, NRF, SEPP, NEF, and Network Functions using Service-Based Interfaces.
  • NGMN Alliance recommendations on 5G security for: network and access, DoS/DDoS attacks prevention, network slicing, Multi-access Edge Computing, low latency communication, etc.
  • GSM Association recommendation on security for: network operators, IoT service ecosystem and IoT end-device ecosystem.
  • GSM Association: lists of critical and high-priority security recommendations, details of selected recommendation examples.

 

Enterprise Related Security Procedures in 5G

 

  • Evolution from 2G to 5G: authentication, ciphering, integrity protection.
  • 5G air interface security algorithms.
  • Pre-R99 SIM and R99+ USIM security features comparison.
  • 5G system authentication methods: 5G AKA and EAP-AKA’.
  • Visited PLMN verification: handling of XRES* and HXRES*.

 

5G Network Security Functions and Procedures

 

  • Security for non-3GPP access: untrusted Wi-Fi, trusted Wi-Fi, wireline.
  • Selected details of secure UE parameters update from HPLMN procedure.
  • “Vertical” security for 4G/5G network exposure via SCEF and NEF.
  • Security of Service Based Architecture of 5G System and non-SBA 5G interfaces.
  • Security principles for inter-operator communication via SEPP and pre-5G interfaces.

COURSE STRUCTURE AND AGENDA

Module – 01

Introduction To 5G Network Security

  • Introduction to 5G Network Security
  • Importance of 5G Network Security
  • Understanding the Evolution of Cellular Systems
  • Introduction to 1G Cellular Systems
  • Advanced Mobile Phone Service
  • Security in 1G
  • Security in 2G
  • Security in GSM
  • Security in 3G
  • Security in CDMA2000
  • Security in UMTS
  • Cellular Systems beyond 3G
  • Key Technologies of 4G
  • Beyond 3G and 4G Cellular Systems Security
  • LTE Security Model
  • Security in WiMAX
Module – 02

Deep Dive Into 5G Network And Technologies

  • System Architecture in 5G
  • Spectrum in 5G
  • Benefits for User and Customer
  • High Data Rate and Ultra Low Latency
  • Massive Connectivity and Seamless Mobility
  • Reliability and High Availability
  • Flexibility and Programmability
  • Energy, Cost and Spectrum Efficiency
  • Security and Privacy
Module – 03

Key Enabling Technologies In 5G

  • 5G Radio Access Network
  • mmWave Communication
  • Massive MIMO
  • Ultra-Dense Small Cells
  • M2M and D2D Communications
  • Cloud-based Radio Access Network
  • Mobile Edge and Fog Computing
  • 5G Mobile Core Network
  • Software Defined Networking
  • Network Function Virtualization
  • Cloud Computing
  • G End-to-End System
  • Network Slicing
  • Management and Orchestration
Module – 04

Standardization Activities In 5G

  • ITU Activities

  • ITU-R
  • ITU-T
  • 3GPP Activities
  • Pre-5G Phase
  • 5G Phase I
Module – 05

Understanding Of Mobile Network Security Landscape

  • Mobile Networks Security Landscape
  • Security Threats and Protection from 1G to 4G
  • LTE UE (User Equipment) Domain Security
  • LTE (Remote Access Network) Domain Security
  • LTE Core Network Domain Security
  • Security Threat Analysis for 4G
  • Security Threats and Protection for 5G
  • Next Generation Threat Landscape for 5G
  • IoT Threat Landscape
  • 5G Evolved Security Model
  • 5G Security Threat Analysis
  • Mobile Security Lifecycle Functions
  • Secure Device Management
  • Mobile OS and App Patch Management
  • Security Threat Analysis and Assessment
  • Security Monitoring
Module – 06

Design Principles For 5G Security

  • Overview on Security Recommendations
  • Security Threats and Recommendations
  • Other Security Challenges
  • Security Challenges in the Access Network
  • DoS Attacks
  • Security Challenges in the Control Layer or Core Network

 

Module – 07

Core Technologies For 5G Security

  • 5G Security Leveraging NFV
  • Network Security Leveraging SDN
  • Security Challenges in SDN
  • Application Layer
  • Controller Layer
  • Infrastructure Layer
  • Security Solutions for SDN
  • Application Plane Security
  • Control Plane Security
  • Data Plane Security Solutions
Module – 08

Security In SDN-Based Mobile Networks

  • Data Link Security
  • Control Channels Security
  • Traffic Monitoring
  • Access Control
  • Network Resilience
  • Security Systems and Firewalls
  • Network Security Automation
Module – 09

Cyber Security Business Models In 5G

  • Understanding the Cyber Security Businesses
  • Types of Cyber Threat
  • The Cost of Cyber-Attacks
  • The Business Model Approach
  • The 4C Typology of the ICT Business Model
  • Business Models in the Context of Cyber Preparedness
  • The Business Case of Cyber Security in the Era of 5G
  • The Users and Issues of Cyber Security in 5G
  • Scenarios for 5G Security Provisioning
  • Delivering Cyber Security in 5G
  • Business Model Options in 5G Cyber Security
Module – 10

5G Network Architectures

  • Network and Service Requirements
  • Virtualization of Network Functions
  • Architectural, Functional, Operational, Legacy Support and Interworking Aspects
  • Separation of Control and User Planes (Software-Defined Networks)
  • Architectural Aspects
  • Network Slicing
  • Heterogeneous and Ultra-dense Networks
  • Cloud-RAN and Virtual-RAN
  • Architectural Aspects
  • Fronthaul Transport and Functional Split Options
  • Backhaul Transport Options
  • Mobile Edge Computing
  • Service and Deployment Scenarios
  • Architectural Aspects
  • Network Sharing
Module – 11

Reference Architectures In 5G

  • Introduction Reference Architectures
  • Access Network
  • Bearers and Identifiers
  • User-Plane and Control-Plane Protocol Stacks
  • Core Network
  • PDN Sessions and 5GC Identifiers
  • User-Plane and Control-Plane Protocol Stacks
  • Dual Connectivity and Multi-connectivity Schemes
  • LTE-NR Interworking and Deployment Scenarios
  • RAN-Level and CN-Level Interworking
  • 5G Deployments Scenarios and Architecture Options
Module – 12

5G-NG RAN Protocol

  • 5G Core Network
  • Radio-Access Network
  • Quality-Of-Service Handling
  • Radio Protocol Architecture
  • User-Plane Protocols
  • Service Data Adaptation Protocol (SDAP)
  • Packet-Data Convergence Protocol (PDCP)
  • Radio-Link Control
  • Medium-Access Control
  • Logical Channels and Transport Channels
  • Scheduling
  • Hybrid ARQ With Soft Combining
  • Physical Layer
  • Control-Plane Protocols
  • RRC State Machine
  • Idle-State and Inactive-State Mobility
  • Tracking the Device
  • Paging Message Transmission
  • Connected-State Mobility
Module – 13

Radio Access Layer 2/3 Aspects And Operation

  • Layer 2 Functions and Services

  • Medium Access Control Sublayer
  • Radio Link Control Sublayer
  • Packet Data Convergence Protocol Sublayer
  • PDCP Services and Functions
  • Header Compression Function
  • Ciphering and Integrity Protection Functions
  • Service Data Adaptation Protocol Sublayer
  • Layer 3 Functions and Services
  • Radio Resource Control Sublayer
  • System Information
  • User Equipment States and State Transitions
  • Idle Mode Procedures
  • Inactive Mode Procedures
  • Connected Mode Procedures
  • User Equipment Capability
  • Discontinuous Reception and Power-Saving Schemes
Module – 14

Physical Layer Security In 5G Network

  • Introduction to Physical Layer Security in 5G Networks
  • WBPLSec System Model
  • Transmitter
  • Jamming Receiver
  • Secrecy Metrics
  • Secrecy Capacity of WBPLSec
  • Secrecy Capacity of iJAM
  • Outage Probability of Secrecy Capacity of a Jamming Receiver
  • Simulation Scenario for Secrecy Capacity
WBPLSec Applied to 5G networks
Module – 15

Security For 5G-WLAN

  • Introduction to WiFi-5G Networks Interoperability
  • WiFi (Wireless Local Area Network)
  • Interoperability of WiFi with 5G Networks
  • Overview of Network Architecture for WiFi-5G Networks Interoperability
  • MAC Layer
  • Network Layer
  • Transport Layer
  • Application Layer
  • 5G-WiFi Security Challenges
  • User and Device Identity Confidentiality
  • Integrity
  • Mutual Authentication and Key Management
  • Introduction to LiFi-5G Networks Interoperability
  • 5G-LiFi Security Challenges
Module – 16

5G Network Physical Infrastructure

  • Introduction to 5G Network Physical Infrastructure
  • Customer Edge Switching (CES) Framework
  • Deployment of CES into 5G Framework
  • Understanding Software Defined Security Monitoring in 5G Network
  • Software-Defined Monitoring Architecture
  • Pros and Cons of Software Defined Monitoring
Module – 17

5G Network Security Framework

  • Best Practices in Mobile Networks Security
  • Mobile Network Challenges and Principles of Security Framework
  • Trust Domains and Trust Processing
  • DNS to Initiate Communication
  • CETP Policy-based Communication
  • Policy Architecture
  • CES Security Mechanisms
  • Realm Gateway
  • RGW Security Mechanisms
  • Name Server Classification and Allocation Model
  • Preventing DNS Abuse
  • Bot-Detection Algorithm
  • TCP-Splice
  • Evaluation of CES Security
  • Evaluating the CETP Policy-based Communication
  • Security Testing
  • Outcomes of the Security Testing
  • Evaluation of RGW Security
  • Deployment in 5G Networks
Module – 18

5G Positioning

  • Outdoor vs Indoor Positioning Technologies
  • Passive vs Active Positioning
  • Overview of 5G Positioning Mechanisms
  • Security Threats in 5G Positioning
  • Security Threats Affecting LISP and LBSP
  • Security Threats Affecting the 5G User Device or LIC
  • Physical-Layer Based Security Enhancements Mechanisms
  • Reliability Monitoring and Outlier Detection Mechanisms
  • Detection, Location and Estimation of Interference Signals
  • Backup Systems
  • Enhancing Trustworthiness
  • Cryptographic Techniques for Security and Privacy of Positioning
  • Cryptographic Authentication in Positioning
  • Cryptographic Distance-Bounding
  • Privacy-Preserving Location-based Services
Module – 19

NFV And NFV-Based Security Services

  • Introduction to NFV
  • NFV, SDN, and a Telco Cloud
  • Key NFV Drivers
  • Opportunity Cost and Competitive Landscape
  • Horizontal Network Slicing
  • Multi-Tenancy
  • Rapid Service Delivery
  • XaaS Models
  • Challenges and Opportunities of NFV Security
  • VNF Security Lifecycle and Trust
  • VNF Security in Operation
  • Multi-Tenancy and XaaS
  • NFV-based Network Security
  • Virtual Security Appliances
  • Distributed Network Security Services
  • Network Security as a Service
  • Policy-based Security Services
  • Machine Learning for NFV-based Security Services
Module – 20

Cloud Computing In 5G

  • Cloud Computing in 5G Networks
  • Cloud Computing Architecture
  • Cloud Deployment Models
  • Cloud Service Models
  • 5G Cloud Computing Architecture
Module – 21

MEC In 5G Networks

  • Introduction to MEC Computing
  • MEC in 5G
  • Understanding the Security Challenges in 5G Cloud
  • Virtualization Security
  • Cyber-Physical System (CPS) Security
  • Secure and Private Data Computation
  • Cloud Intrusion
  • Access Control
  • Security Challenges in 5G MEC
  • Denial of Service (DoS) Attack
  • Man-in-the-Middle (MitM)
  • Inconsistent Security Policies
  • VM Manipulation
  • Privacy Leakage
  • Security Architectures for 5G Cloud and MEC
  • Centralized Security Architectures
  • SDN-based Cloud Security Systems
  • 5GMEC, Cloud Security Research and Standardizations