Course Overview

5G networks are being rapidly deployed globally promising higher bandwidth, more connectivity, and less latency. While these features will have benefits to society, greater reliance on ubiquitous high-speed, high-bandwidth connectivity comes with increased demand to secure 5G networks. The time to embed greater security to mitigate threats before they occur is now.

In this course, you will learn why 5G networks represent a distinct and major evolutionary phase in wireless mobile communication. More importantly, you will understand why 5G networks need greater protection and improved security to deliver the full potential of 5G. This course is focused on 5G security in current and future deployments of mobile communication networks. You will learn about 5G security standards and enhancements that focus on improving security. Further, you will understand why the use of virtualized network functions and containerized network functions results in the adoption of security practices used in information technology. Particular focus will be provided for Open RAN and private wireless networks.

By the end of this course, you will understand the need for built-in security for 5G networks and learn about best practices and standards to meet the goal of the most secure, most protected wireless network possible.

The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/5G-Security-Deconstructed

What You Will Learn

  • The importance of securing and protecting 5G wireless networks.
  • The biggest threats to 5G wireless networks.
  • The 5G network security landscape.
  • The infrastructure necessary for 5G network security.
  • The practical steps necessary to protect your 5G network.

Program Curriculum

  • High Level Overview
  • Key Aspects of 5G Network Security
  • Section Summary
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Section Introduction
  • Evolution of Wireless Networks
  • Architecture Changes in Wireless Networks
  • Potential Vulnerabilities and Risks
  • Section Summary
  • Chapter 2 Quiz

  • Section Introduction
  • 5G Standards Bodies
  • 5G Non-Standalone Networks
  • 5G Standalone Networks
  • Current Global Deployment Status
  • UE, RAN, and Core Threats
  • Section Summary
  • Chapter 3 Quiz

  • Section Introduction
  • Design Principles for 5G Networks
  • Cyber Security Best Practices
  • 5G Physical Layer Security
  • 5G-WLAN Security
  • Securing 5G Networks Holistically
  • Current Regulatory and Governmental Impacts
  • Section Summary
  • Chapter 4 Quiz

  • Section Introduction
  • Customer Edge Switching
  • SDN/NFV Security Monitoring
  • Securing IOT
  • VNF and CNF Security
  • Cloud and MEC Security
  • Section Summary
  • Chapter 5 Quiz

  • Section Introduction
  • Subscriber Privacy
  • Secure Communications
  • Centralized Identity Management
  • RAN and Core Network Security
  • Roaming Security
  • Section Summary
  • Chapter 6 Quiz

  • Section Introduction
  • Protocol Vulnerabilities
  • AKA Attacks
  • Disclosure of Subscriber Unique Identifier
  • Spectrum Slicing Attack
  • Policies and Standards, Supply Chain, and Architecture
  • Section Summary
  • Chapter 7 Quiz

  • Section Introduction
  • Access Control Standards and Processes
  • Systems Surveillance and Monitoring
  • Network Access Security
  • Cell Site Security
  • Section Summary
  • Chapter 8 Quiz

  • Overview of Key Takeaways from Course
  • Contact Information
Load more modules

Instructor

Brian Newman

Brian Newman has worked for the three largest telecommunications companies in the US over the last 30 years. His experience has been in both wireless and wireline networks, focusing on deploying systems, improving operations, and transforming business processes. He has certifications from the Project Management Institute, Scaled Agile, and Verizon in Lean Six Sigma. In 1998, he received a US Patent [#5,835,907], which supported the initial integration of GPS data and cellular networks, leading to the use of smartphone geolocation and mapping that is common around the world today. Newman sees 5G as genuinely transformational and, as such, it has to have security that will enable it to provide less latency, higher bandwidth, and support for millions of concurrent attached devices. He is deeply involved in building and constructing 5G networks that have the right infrastructure from Day 1.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8