5G Security & Privacy Practices
5G
| Intermediate
- 12 Videos | 59m
- Includes Assessment
- Earns a Badge
While 5G opens up new opportunities, it also introduces new challenges. These include security and privacy concerns. Many of the characteristics of 5G can be leveraged by malicious attackers to compromise networks and the services they carry. However, with the appropriate deployment methodologies, virtually all of these vulnerabilities can be addressed to ensure a safe and secure network for all users. Use this course to investigate various aspects of security for 5G networks. Begin by exploring security and privacy in general before taking a closer look at the potential vulnerabilities inherent to 5G. Finally, examine the various built-in security mechanisms used to mitigate these threats, as well as the best practices and policies employed to ensure 5G remains safe for all to use. When you're done, you'll be able to provide solutions and workarounds for the primary security and privacy issues pertinent to 5G.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseoutline the history of security in telecommunications as well as the importance of privacy, especially in today’s highly connected networkidentify the most common motivations behind attacks on telecom networks, including acquiring information and disrupting servicesdiscuss the fundamental principles involved in the implementation of network security and the methodologies used to achieve itdescribe the network vulnerabilities that are unique to 5G networksexamine how the very architecture of 5G vastly increases the number of potentially vulnerable entry points into the network due to various technological innovations
-
describe the 5G security vulnerabilities introduced with the advent of virtualization and slicing mechanismsoutline how the use of non-standalone installations can introduce new vulnerabilities that must be dealt withlist the various solutions made available to both equipment vendors as well as mobile network operators to ensure safe communication over 5G networkslist the various standards that have been put into place in 5G networks by design to ensure network security on 5G infrastructuredescribe how security policies must be system-wide, where telecom networks such as 5G are only one of many important componentssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview2m 27sUP NEXT
-
2.History of Security and Privacy in Telecom5m 57s
-
3.Attacker Motivations for Telecom Network Attacks5m 22s
-
4.Network Security Fundamentals and Methodologies5m 50s
-
5.Security Concerns Unique to 5G5m 52s
-
6.Multiplication of Points of Entry in 5G Architecture6m 21s
-
7.Virtualization and Slicing Vulnerabilities in 5G5m 42s
-
8.Mixing 4G and 5G Vulnerabilities3m 46s
-
9.Solutions to 5G Network Security & Privacy Concerns5m 50s
-
10.Built-in 5G Security Standards5m 53s
-
11.A System-wide Approach to 5G Security4m 47s
-
12.Course Summary1m 14s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.