Telecoms & Tech Academy is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.

5G Security

Virtual Classroom

Course Overview

Network operators around the world are busy deploying 5G technology, which will undoubtedly have a huge impact on all aspects of our lives.

After describing some of the use cases for 5G, this course provides an overview of the security threats to this new 5G technology. The various 4G & 5G network security features, protocols and procedures of both SA & NSA options are described and explained, along with a description of network interconnects in roaming scenarios.

Why choose this course?

Programme format

This programme can be delivered live using a virtual classroom in a single 3 hour session This can be as a stand alone course, or as an addition to other live virtual classroom modules. 

Who is it for?

The course is designed for operators, vendors, developers & regulators wishing to have a better understanding of 5G security. Engineers as well as staff involved in the architecture, optimisation, management, monitoring or testing of the 5G network would benefit from attending this training programme.

Programme agenda

Single 3 hour live online session delivered by a subject matter expert. 

  • 5G Use Cases 
  • 3GPP Releases and Road map 
  • 5G Threat and Sensitivity Analysis 
  • 5G Architecture Options (SA vs NSA) 
  • 5G Core Network Slicing 
  • 5G Security Features 
  • RAN Options and Protocols 
  • 4G/5G Authentication 
  • 5G Session Key Hierarchy 
  • Key Handling at Handover in NR 
  • Roaming Scenarios and Interconnects 

Learning Outcomes

Benefits for Professionals

  • Describe the critical and high sensitivity attack vectors that could be used against a 5G network 
  • Explain the differences in approach to security in SA and NSA deployments 
  • Outline the 5G Authentication and Key Agreement procedures 
  • Recognise how session keys are used during handovers in NR 
  • Understand the security features employed on roaming interfaces in the 5G core network 

Benefits For Your Organisation

  • Improved knowledge of the 5G security environment 
  • Understand security threats and mitigtion strategies in 5G networks 
  • Assess security threats and strategies for products using 5G infrastructure 
  • Understand implications for products using 5G  
  • Improved understanding of 5G security in new use cases