LTE Security Training

LTE Security Training

Print Friendly, PDF & Email

Introduction:

LTE Security Training Course with Hands-on Exercises (Online, Onsite and Classroom Live)

LTE Security Training discusses how LTE/E-UTRAN and EPC security substantially extends GSM, 3G/UMTS, and IMS security. LTE Security Training and LTE Advanced Security Training also encompasses the E-UTRAN, EPC and IMS security architectural. This LTE Security course presents in detail the security mechanisms employed to meet current and future LTE requirements.

Duration: 2 days

Related Courses

Customize It:

  • If you are familiar with some aspects of this LTE Security course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the LTE Security course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the LTE Security Training course in manner understandable to lay audiences.

LTE Security Training – Objectives:

After completing this LTE Security Training course, attendees will be able to:

  • Shows how GSM and 3G/UMTS security was enhanced and extended to meet the requirements of LTE and LTE/Advanced fourth generation systems
  • Shows concepts behind LTE/E-UTRAN, LTE-Advanced, EPC, IMS and Voice over LTE (VoLTE) Security
  • Explains why LTE security solutions are designed

LTE Security Training – Course Syllabus:

  • Evolution of Cellular Systems from GSM to LTE-Advanced
  • Introduction to LTE and LTE-Advanced
  • Basic Security Concepts
  • Basic Cryptographic Concepts
  • Principles of GSM Security
  • GSM Cryptographic Algorithms
  • Principles of Third-Generation (3G) Security
  • UMTS Cryptographic Algorithms
  • 3G–WLAN Interworking
  • Generic Bootstrapping Architecture (GBA /GAA)
  • Security Mechanisms of 3G–WLAN Interworking
  • Cryptographic Algorithms for 3G–WLAN Interworking
  • EPS Security Architecture
  • Requirements and Features of EPS Security
  • EPS Authentication and Key Agreement (AKA)
  • EPS Authentication and Key Agreement Procedure
  • Key Hierarchy
  • EPS Protection for Signaling and User Data
  • NAS Signaling Protection
  • AS Signaling and User Data Protection
  • The AS (RRC and UP) and NAS Security
  • NAS and AS protection keys
  • The eNB cryptographically  keys
  • NAS (EPC/UE) level AKA procedure (KASME)
  • key identifier (KSIASME)
  • Certificate Enrolment for Base Stations
  • Security in Intra-LTE State Transitions and Mobility
  • Transitions to and from Registered State
  • Periodic Local Authentication Procedure
  • EPS Cryptographic Algorithms
  • Ciphering Algorithms and Keys
  • Integrity Algorithms and Keys
  • Key Derivation Algorithms
  • Interworking Security between EPS and Other Systems
  • Security for IMS and Voice over LTE (VoLTE)
  • IMS (Signaling and Media) security
  • Rich Communication Suite (RCS) and Voice over LTE
  • Security for Home Base Station Deployment
  • Closed Subscriber Groups and Emergency Call Handling

Request More Information

    Time frame:

    0