• Skip to primary navigation
  • Skip to main content
  • Skip to footer
NCTI logo image

NCTI

Train up

  • Content Solutions
    • NCTI Courses
      • All Technical
        • 5G & Wireless
        • Fiber Tech 360
      • Customer Care
      • Leadership
      • General Education
    • Custom Content
    • Learning Delivery
  • Certifications
    • Master Technician
    • Master Representative
    • Emerging Leader
    • Master Dispatcher
    • Telecom Specialist
  • College Program
    • Broadband Technology
    • Customer Care
    • Broadband Leadership
  • Hall of Fame
  • About
    • Our Team
    • News & Announcements
  • Support
    • Contact
    • FAQs
    • Resources
  • Login

5G Security

Delivery: Online

Estimated Length: 6 seat hours

Price: $320

Add to My Account    Create New Account

When 5G Standalone networks become operational, service providers will be required to adopt new mechanisms for security in 5G, namely 5G Authentication and Key Agreement and SBI (Service Based Interface) security. Grounded in LTE based techniques, 5G AKA introduces enhancements to protect against fraudulent activity, particularly with respect to key usage and subscriber authentication. For the 5G Service Based Architecture, SBIs are protected using a combination of TLS and OAuth 2.0.This course seeks to explore each of these areas by initially evaluating the end to end 5G System, in terms of architecture and overall operation, with emphasis on security roles. 5G AKA will then be explored in detail, including signalling flows and API exchange, before concluding with a breakdown of SBI security.

Completion Time:

The estimated completion time for this course is six hours. The maximum allotted time is six months from enrollment.

Looking for more 5G training?

Our 5G and Essential Technologies package gives you exclusive access to this course plus 64 more full courses, 60 Telecoms Bytes micro-courses, and the NetX network visualization tool, so you can choose what you want to study and learn at a pace that suits you. Best of all, the 5G and Essential Technologies package gives you a year to explore the catalog and take as many courses and micro-lessons as you need, for one incredibly low price. LEARN MORE

Outline:

1. 5G Assets and Threats
Topic areas covered include:
  • What are We Protecting?:
    • 5G System Architecture
    • Critical Assets
  • General Threat Landscape for 5G Networks:
    • General Threat Landscape Overview
    • Spoofing Identity
    • Tampering with Data
    • Repudiation
    • Information Disclosure
    • Denial of Service
    • Privilege Elevation
  • 5G Core Network Threats:
    • 5G Core Network Threats Overview
    • AMF Assets and Threats
    • SMF Assets and Threats
    • UPF Assets and Threats
    • UDM Assets and Threats.
  • Access Network Threats:
    • Access Network Threats Overview
    • gNB Assets and Threats.
2. 5G Architectural Security
Topic areas covered include:
  • Supporting Security in 5G:
    • 5G Security Overview
    • Standards Bodies
  • Protecting Service Based Interfaces – HTTPS:
    • TLS Overview
    • TLS Operation
    • Certificate Exchange
    • TLS Cipher Suites
  • Protecting the 5G SBA – OAuth 2.0:
    • OAuth 2.0 Basic Concept
    • Access Token Acquisition
    • Access Token Utilization
  • Securing AN to CN Communication:
    • IPSec in 5G
    • IPSec Basic Operation
    • Establishment of gNB Security Associations.
  • End to End Security Considerations:
    • Network Slicing
    • NSSAAF and NSACF
    • Multi access Edge Computing
    • Protecting the Subscriber Identity
  • Roaming Security:
    • Security Edge Protection Proxy
    • PRINS
    • IPUPS
    • Steering of Roaming Protection.

Footer

Follow Us on Social Media!

  • Email
  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Can’t Find It?

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

NCTI logo image

 

©2024 Jones/NCTI®, Inc.
All rights reserved.

Terms of Use | Privacy Policy

 

7807 E. Peakview Ave.

Ste. 450

Centennial, CO 80111 USA