Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Training

GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Training

GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Training:

GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Training (Online, Onsite, and Classroom Live)

GSM and Security Training is an intermediate-level in-depth course on GSM, GPRS, and EDGE with an overview of UMTS, HSPA, and LTE with a particular emphasis on the issues of security and vulnerability.

Covered in depth are Key GSM concepts, modulation and coding, GSM air interface, GSM protocol and call processing, roaming and handover, GSM data services (GPRS/EDGE), QoS and KPIs, location-based services, types of security threats, attacks in a mobile environment, mobile malware, cryptography, access control, and authentication, smart card security, GSM security, 3G network security, and comparison of GSM with other technologies.

What’s Included

  • 5 Days of GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Training with an expert instructor
  • GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Electronic Course Guide
  • 100% Satisfaction Guarantee
  • Certificate of Completion

Resources

Related Courses

Customize It:

  • If you are familiar with some aspects of GSM | GPRS | EDGE | UMTS | HSPA | LTE Security, we can omit or shorten their discussion.
  •  We can adjust the emphasis placed on the various topics or build the GSM | GPRS | EDGE | UMTS | HSPA | LTE Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the GSM | GPRS | EDGE | UMTS | HSPA | LTE Security course in manner understandable to lay audiences.

Course Outline:

Part 1: Key GSM Concepts (Day 1)

Cellular concept and radio propagation
Base and mobile stations
RF propagation and path loss
Antennas and frequency reuse

Duplexing and multiple access

Time and frequency division duplexing
Time and frequency division multiple access
Code division multiple access
Frequency hopping concept

Evolution of cellular communications

Circuit and packet switching
3GPP, 3GPP2, and IEEE LAN/MAN standardization
1G to 4G
Phone comparisons

Overview of GSM architecture, protocols, and services

System architecture
Protocol layer overview
Protocol functions and standards
Operating frequencies
GSM data: GPRS and EDGE overview

Addressing and numbering

Cell identities
Mobile station identities

Part 2: Modulation and Coding for GSM (Day 1)

GSM modulation methods

Modulated signal structure
Amplitude, frequency, and phase shift keying
Gaussian minimum shift keying (GMSK)

Error control

Error detection
Error correction
Automatic repeat request

Speech coding

Speech quality rating
Speech coding methods and complexity
GSM speech coding techniques
GSM speech frame construction

Part 3: GSM Air Interface (Day 2)

GSM TDMA and physical channels

Time slots and their use within a frame
Frame structures and hierarchy
Physical channels and their properties
Uplink and downlink timing

GSM logical channels

Broadcast channels (BCH): Broadcast control, frequency correction, synchronization
Common control channels (CCCH): Paging, random access, access grant
Dedicated control channels (DCCH): Stand-alone dedicated control channels
Associated control channels (ACCH): Slow and fast
Traffic control channels (TCH): Full rate, half rate, cell broadcast

GSM burst family: Mapping logical channels to physical channels

Normal
Frequency correction
Synchronization
Access
Dummy

Radio subsystem link control

Radio performance requirements
Channel measurements
Transmission power control
Channel failure disconnect
Power conservation

Part 4: GSM Protocols and Call Processing (Day 2)

User plane architecture

Speech transmission
Data transmission

Signaling plane architecture

Layered processing
Radio resource management
Mobility management
Connection management
Mobile application part

Radio resource management

Connection setup and release
Mobility management
Connection management

Part 5: Roaming and Handover (Day 3)

Call routing and termination

Routing calls to the MS
Call termination

Handover

Intra-MSC handover
Handover decision process and timing
MAP and inter-MSC handover

Key Performance Indicators (KPI)

Speech quality
Bit and frame error rate
Dropped call rate
Call and handover success rates

Part 6: GSM Data Services (Day 3)

Quality-of-Service (QoS) requirements

The QoS challenge
General QoS categories
QoS parameter negotiation
QoS management

General Packet Radio Service (GPRS)

Network architecture
Protocol structures
GPRS on the GSM air interface
Medium access control
Radio link control
Mobility management

Enhanced Data Rates for GSM Evolution (EDGE)

EDGE modulation and coding
EDGE air interface protocols
MAC and RLC procedures

Key Performance Indicators (KPI)

Reliability
Throughput
Delay

Part 7: Location-Based Services (Day 4)

Introduction to LBS

Definitions
Classifications and applications

Location management
Location update and paging
Location management in circuit and packet-switched networks

Location services methods and performance

Accuracy requirements
Cell identity and timing advance (TA)
Enhanced observed time difference (E-OTD)
Uplink time difference of arrival (U-TDoA)
Assisted GPS

LBS operation

Patterns and privacy
Architecture and protocols

Part 8: Communication Security (Day 4)

Wireless security challenges

Threat categories and attack methods
The general security setup process

Attacks in mobile environments
Illicit use
Spoofing
Man-in-the-middle
Interception of data
Denial of service

Mobile malware

Basics and characteristics of malware
Types of malware: Worms, viruses, phishing, etc.
Examples of malware in mobile devices

Cryptography basics

Symmetric cryptography
Asymmetric cryptography
Public key infrastructure
Digital signature
Cryptographic attacks

Access control and authentication

Weak and strong authentication schemes
Attacks on authentication
Authorization and access control

Smart card security

Smart card basics
Smart card communication
Invasive and non-invasive attacks on smart cards

GSM security

GSM security model
Basic attacks on GSM
GSM encryption algorithms
Advanced attacks on GSM
Improving GSM security

Overview of 3G network security

Access and domain security
Mitigating GSM security weaknesses
Attacks on 3G networks

Part 9: Beyond GSM (Day 5)

Universal Mobile Telecommunications System (UMTS)

Network structure and protocols
Overview of code division multiple access
Summary of the UMTS air interface
CAMEL: Bringing intelligent networking to GSM and UMTS

High-Speed Packet Access (HSPA)HSDPA (downlink) and HSUPA (uplink)

Review of the HSPA air interface

Long-Term Evolution (LTE)

Network structure and protocols
Overview of orthogonal frequency division multiplexing (OFDM)
Summary of the LTE air interface

Technology comparisons

Summary of cdmaOne
Summary of cdma2000
Summary of WiMax
GSM vs cdmaOne
UMTS vs cdma2000
LTE vs WiMAX

Course Conclusion

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame: