GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Training:
GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Training (Online, Onsite, and Classroom Live)
GSM and Security Training is an intermediate-level in-depth course on GSM, GPRS, and EDGE with an overview of UMTS, HSPA, and LTE with a particular emphasis on the issues of security and vulnerability.
Covered in depth are Key GSM concepts, modulation and coding, GSM air interface, GSM protocol and call processing, roaming and handover, GSM data services (GPRS/EDGE), QoS and KPIs, location-based services, types of security threats, attacks in a mobile environment, mobile malware, cryptography, access control, and authentication, smart card security, GSM security, 3G network security, and comparison of GSM with other technologies.
What’s Included
- 5 Days of GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Training with an expert instructor
- GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Electronic Course Guide
- 100% Satisfaction Guarantee
- Certificate of Completion
Resources
- GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Training – https://www.wiley.com/
- GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Training – https://www.packtpub.com/
- GSM | GPRS | EDGE | UMTS | HSPA | LTE Security – https://store.logicaloperations.com/
- GSM | GPRS | EDGE | UMTS | HSPA | LTE Security – https://us.artechhouse.com/
- GSM | GPRS | EDGE | UMTS | HSPA | LTE Security – https://www.amazon.com/
Related Courses
- GSM MAP Training
- GSM Training in Depth
- GSM | GPRS | EDGE | RAN Optimization Training
- GPRS Training | General Packet Radio Service Training
- GPRS | EGPRS Design and Optimization Training
- EGPRS System Engineering Training
- UMTS Training | Universal Mobile Telecommunication System
- All Wireless: RF, WiFI, Bluetooth, WiMAX, CDMA, GSM, UMTS, LTE
Customize It:
- If you are familiar with some aspects of GSM | GPRS | EDGE | UMTS | HSPA | LTE Security, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the GSM | GPRS | EDGE | UMTS | HSPA | LTE Security course in manner understandable to lay audiences.
Course Outline:
Part 1: Key GSM Concepts (Day 1)
Cellular concept and radio propagation
Base and mobile stations
RF propagation and path loss
Antennas and frequency reuse
Duplexing and multiple access
Time and frequency division duplexing
Time and frequency division multiple access
Code division multiple access
Frequency hopping concept
Evolution of cellular communications
Circuit and packet switching
3GPP, 3GPP2, and IEEE LAN/MAN standardization
1G to 4G
Phone comparisons
Overview of GSM architecture, protocols, and services
System architecture
Protocol layer overview
Protocol functions and standards
Operating frequencies
GSM data: GPRS and EDGE overview
Addressing and numbering
Cell identities
Mobile station identities
Part 2: Modulation and Coding for GSM (Day 1)
GSM modulation methods
Modulated signal structure
Amplitude, frequency, and phase shift keying
Gaussian minimum shift keying (GMSK)
Error control
Error detection
Error correction
Automatic repeat request
Speech coding
Speech quality rating
Speech coding methods and complexity
GSM speech coding techniques
GSM speech frame construction
Part 3: GSM Air Interface (Day 2)
GSM TDMA and physical channels
Time slots and their use within a frame
Frame structures and hierarchy
Physical channels and their properties
Uplink and downlink timing
GSM logical channels
Broadcast channels (BCH): Broadcast control, frequency correction, synchronization
Common control channels (CCCH): Paging, random access, access grant
Dedicated control channels (DCCH): Stand-alone dedicated control channels
Associated control channels (ACCH): Slow and fast
Traffic control channels (TCH): Full rate, half rate, cell broadcast
GSM burst family: Mapping logical channels to physical channels
Normal
Frequency correction
Synchronization
Access
Dummy
Radio subsystem link control
Radio performance requirements
Channel measurements
Transmission power control
Channel failure disconnect
Power conservation
Part 4: GSM Protocols and Call Processing (Day 2)
User plane architecture
Speech transmission
Data transmission
Signaling plane architecture
Layered processing
Radio resource management
Mobility management
Connection management
Mobile application part
Radio resource management
Connection setup and release
Mobility management
Connection management
Part 5: Roaming and Handover (Day 3)
Call routing and termination
Routing calls to the MS
Call termination
Handover
Intra-MSC handover
Handover decision process and timing
MAP and inter-MSC handover
Key Performance Indicators (KPI)
Speech quality
Bit and frame error rate
Dropped call rate
Call and handover success rates
Part 6: GSM Data Services (Day 3)
Quality-of-Service (QoS) requirements
The QoS challenge
General QoS categories
QoS parameter negotiation
QoS management
General Packet Radio Service (GPRS)
Network architecture
Protocol structures
GPRS on the GSM air interface
Medium access control
Radio link control
Mobility management
Enhanced Data Rates for GSM Evolution (EDGE)
EDGE modulation and coding
EDGE air interface protocols
MAC and RLC procedures
Key Performance Indicators (KPI)
Reliability
Throughput
Delay
Part 7: Location-Based Services (Day 4)
Introduction to LBS
Definitions
Classifications and applications
Location management
Location update and paging
Location management in circuit and packet-switched networks
Location services methods and performance
Accuracy requirements
Cell identity and timing advance (TA)
Enhanced observed time difference (E-OTD)
Uplink time difference of arrival (U-TDoA)
Assisted GPS
LBS operation
Patterns and privacy
Architecture and protocols
Part 8: Communication Security (Day 4)
Wireless security challenges
Threat categories and attack methods
The general security setup process
Attacks in mobile environments
Illicit use
Spoofing
Man-in-the-middle
Interception of data
Denial of service
Mobile malware
Basics and characteristics of malware
Types of malware: Worms, viruses, phishing, etc.
Examples of malware in mobile devices
Cryptography basics
Symmetric cryptography
Asymmetric cryptography
Public key infrastructure
Digital signature
Cryptographic attacks
Access control and authentication
Weak and strong authentication schemes
Attacks on authentication
Authorization and access control
Smart card security
Smart card basics
Smart card communication
Invasive and non-invasive attacks on smart cards
GSM security
GSM security model
Basic attacks on GSM
GSM encryption algorithms
Advanced attacks on GSM
Improving GSM security
Overview of 3G network security
Access and domain security
Mitigating GSM security weaknesses
Attacks on 3G networks
Part 9: Beyond GSM (Day 5)
Universal Mobile Telecommunications System (UMTS)
Network structure and protocols
Overview of code division multiple access
Summary of the UMTS air interface
CAMEL: Bringing intelligent networking to GSM and UMTS
High-Speed Packet Access (HSPA)HSDPA (downlink) and HSUPA (uplink)
Review of the HSPA air interface
Long-Term Evolution (LTE)
Network structure and protocols
Overview of orthogonal frequency division multiplexing (OFDM)
Summary of the LTE air interface
Technology comparisons
Summary of cdmaOne
Summary of cdma2000
Summary of WiMax
GSM vs cdmaOne
UMTS vs cdma2000
LTE vs WiMAX
Course Conclusion
Whether you are looking for general information or have a specific question, we want to help!
Request More Information