Enter a short description of the course.
Today’s telecom networks play a important role in human life. Mobile communication is universal in all countries. So it is very important to hackers and nations to learn about telecom facilities and also protect their own infrastructure.
Course duration: 18 hours (18 CPE points)
Course is self-paced and pre-recorded
Course launch: November 15th 2018
First 10 seats available with early bird discount!
What will you learn?
In this course, you will learn about mobile network generations, their architecture, interfaces and protocols. Then you can find how many elements are involved during a simple call. Telecom voice and data knowledge are so important for us to find security flaws. The main delivery is the final section after each generation is “Security”. In Security section we will learn about threats and vulnerabilities in that network and security features to protect it.
What skills will you gain?
- Telecom networks fundamentals
- Telecom networks security
What will you need?
A notebook with wide papers to draw networks and analyze them.
What should you know before you join?
Actually, the requirement to enter Telecom security course is having knowledge about telecom network and infrastructure. But in this course you don’t need to have this knowledge and experience because we will cover all necessary topics and contents about telecom networks and mobile generations.
About your instructor: Ali Abdollahi
I’m Ali Abdollahi. I’m a network and cyber security consultant. I have experience in carrier-grade networks and security technology. I‘ve worked in telecom and enterprise companies to secure and optimize their infrastructure and services. I have also done many projects on penetration testing and malware analysis in other sectors.
GSM network and Security
In this module, we will become familiar with second generation of mobile networks that’s called 2G. After that we will learn about the next generation 2.5G or EDGE. Then we will cover all threats around the network and security mechanisms used in this kind of mobile network.
- Circuit switch
- SS7 protocol
- Air Interfaces
- Mobility Management
- Location area network
- GPRS Interfaces
- Network Model
- GPRS RRM
- Ps-Core Interfaces
- GPRS session management
GSM security considerations:
- GSM vulnerabilities
- Auth and Encryption
- User confidentiality
- Network security
Module 1 Exercise topics:
- GSM/Edge network architecture and security vulnerabilities
3G network and Security
In this generation, IP is more involved than the previous one. Representing IP means that we will face with more threats and risks. The technology used in third generation is UMTS. One of the main goals of 3G networks is increasing the Internet speed. In 3G networks we have some changes in radio access and core networks. All vulnerabilities and threats in 2G still remain and some new threats are added in this generation.
- UMTS Introduction
- Network architecture
- Control plane
- User plane
- UMTS interfaces
- UMTS perspective
- Radio interfaces
- UMTS protocols
- 3G UMTS security features
- IMS security
- UMTS cryptography
- 3G/UMTS confidentiality & Integrity
- UMTS authentication
Module 2 Exercise Topics:
- 3G/UMTS network architecture and security vulnerabilities
LTE Network and Security
The fourth mobile generation made many changes from radio access to core network. We are involved with IP in many areas in LTE subsystems and this is one of main reasons for insecurity in LTE networks. LTE supports different radio access devices and technologies so each one has own vulnerabilities and security threats. In this module, we will cover all core concepts, like Evolved Packet Core (EPC) and protocols, then we will explain all vulnerabilities in each sector and subnetwork and their hardening solutions.
- What is LTE
- LTE network and interfaces
- Basic procedures
- Mobility management
- LTE security principles
- LTE cryptographic
- Internetworking security
- VoLTE security
- Backhaul security
Module 3 Exercise Topics:
- LTE network architecture and security vulnerabilities
- The course is self-paced – you can visit the training whenever you want and your content will be there.
- Once you’re in, you keep access forever, even when you finish the course.
- There are no deadlines, except for the ones you set for yourself.
- We designed the course so that a diligent student will need about 18 hours of work to complete the training.
- Your time will be filled with reading, videos, and exercises.
If you have any questions about the course, get in touch with us at Hakin9 by contacting our Course Coordinator Marta at [email protected]
No Reviews found for this course.