IT Security Holistic Overview

  • Home
  • IT Security Holistic Overview
( 0 Rating )
Shape Image One
  • Course level: Intermediate

Description

As telecommunications evolves and becomes increasingly pervasive in society, cybersecurity will need constant vigilance. Security in the era of 5G is going to require continuous assessment and mitigation to ensure that all vulnerabilities and threats are managed proactively.

It is important to that we look at security holistically from local to international, from operations to supply chain and dependencies.

This 3-day course is focused providing tools to understand, assess and mitigate the threats and vulnerabilities within a holistic view as Security is all encompassing.

What Will I Learn?

  • Understand the different Security Technical components and functions and how they can be applied
  • Explain the technical description of RAN (Radio Access Network) and core network separation regarding security in 5G.
  • Explain the differences of authentication and key management across 2G/3G/4G and 5G.
  • Assess options to secure subscriber’s credentials and authentication.
  • Explain Telco and Hybrid Cloud Security.
  • Evaluate software-defined networking solutions for next generation cellular networks within in the context of securing and managing the control plane.
  • Identify Mobile and Internet Protocol threats.
  • Develop Holistic Security strategies.

About the instructor

0 (0 ratings)

66 Courses

8 students

Free

Requirements

  • Introduction to 5G/LTE and light reading on TCP/IP Protocol- recommended but not essential.

Target Audience

  • RAN, IP and Packet Core Engineers
  • Planners
  • Middle Management.