Course Details
Standalone 5G poses new challenges for the mobile service provider, with a wide array of new technologies and techniques being introduced into the network architecture, all of which must be secure. This course takes an end to end view of 5G security, first of all determining what assets are applicable to the 5G architecture and which threats are relevant. The course then moves on to examine the security techniques being relied upon to provide end to end security, before concluding with a detailed analysis of 5G Authentication and Key Agreement.

Gavin Mitchell
Mpirical Trainer
Gavin heads up Mpirical’s training product portfolio, which includes all course development alongside the development of NetX. Gavin’s main area of focus is 4G and 5G core networks, with considerable expertise gained over the 20 years of training experience he has within the mobile telecommunications space.
£245
Individual Course
Module 1
View
5G Assets and Threats
What are We Protecting?
- 5G System Architecture.
- Critical Assets.
General Threat Landscape for 5G Networks:
- General Threat Landscape Overview.
- Spoofing Identity.
- Tampering with Data.
- Repudiation.
- Information Disclosure.
- Denial of Service.
- Privilege Elevation.
5G Core Network Threats:
- 5G Core Network Threats Overview.
- AMF Assets and Threats.
- SMF Assets and Threats.
- UPF Assets and Threats.
- UDM Assets and Threats.
Access Network Threats:
- Access Network Threats Overview.
- gNB Assets and Threats.
Module 2
View
5G Architectural Security
Supporting Security in 5G:
- 5G Security Overview.
- Standards Bodies.
Protecting Service Based Interfaces – HTTPS:
- TLS Overview.
- TLS Operation.
- Certificate Exchange.
- TLS Cipher Suites.
Protecting the 5G SBA - OAuth 2.0:
- OAuth 2.0 Basic Concept.
- Access Token Acquisition.
- Access Token Utilization.
Securing AN to CN Communication:
- IPSec in 5G.
- IPSec Basic Operation.
- Establishment of gNB Security Associations.
End to End Security Considerations:
- Network Slicing – NSSAAF and NSACF.
- Multi access Edge Computing.
- Protecting the Subscriber Identity.
Roaming Security:
- Security Edge Protection Proxy.
- PRINS.
- IPUPS.
- Steering of Roaming Protection.
Module 3
View
5G Authentication and Key Agreement
5G Cryptographic Processes:
- 5G Security Algorithms.
- Authentication and Key Agreement.
- AV Generation.
5G AKA:
- Mutual Authentication.
- High Level 5G AKA Procedure.
- Generation of 5G-SE-AV.
- Device Authentication.
- Authentication Confirmation.
Key Derivation and Usage:
- Encryption and Integrity Checking.
- Key Derivation Process.
Security Procedures:
- Key Distribution in 5G.
- NAS Signalling Security.
- RRC Signalling Security.
- Periodic Local Authentication.
£245
Individual Course
Available as part of our Package Options
Also available as Live training, online or onsite
Pricing
£245
Individual Course
£395
Package Options
Let's chat
Live Training
Live Training
Individual Course
£245
Cellular Cybersecurity
from
£395
4G/5G Package
from
£895
Unlimited Access Package
from
£995
Access to this video course
Access to reference document
Access to learning platform
Access to NetX
Access to glossary of terms
Access to blogs
Certificate of completion
Earn badges for activities
Access to multiple courses
Access to technology related Telecoms Bytes
Access to all on-demand courses
Access to full Telecoms Bytes catalogue
Access to NetXplore virtual world
Access to NetXpert assessments
Access to NetXlabs