WCDMA | UMTS | CDMA2000 Technology and Security Training:
WCDMA | UMTS | CDMA2000 Technology and Security Training Course (Online, Onsite, and Classroom Live!)
This is an intermediate-level in-depth WCDMA | UMTS | CDMA2000 Technology and Security Training course on CDMA/CDMA2000 (CDMAOne, 1xRTT, EVDO) and WCDMA (UMTS/HSPA as well as LTE) with a particular emphasis on the issues of security and vulnerability.
What’s Included?
- 5 days of WCDMA | UMTS | CDMA2000 Technology and Security Training with an expert instructor
- WCDMA | UMTS | CDMA2000 Technology and Security Electronic Course Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
Resources:
- WCDMA | UMTS | CDMA2000 Technology and Security Training – https://www.wiley.com/
- WCDMA | UMTS | CDMA2000 Technology and Security Training – https://www.packtpub.com/
- WCDMA | UMTS | CDMA2000 Technology and Security – https://store.logicaloperations.com/
- WCDMA | UMTS | CDMA2000 Technology and Security – https://us.artechhouse.com/
- WCDMA | UMTS | CDMA2000 Technology and Security Training – https://www.amazon.com/
Related Courses
Customize It:
- We can adapt this training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this WCDMA, UMTS, and CDMA2000 Technology and Security Training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the WCDMA, UMTS, and CDMA2000 Technology and Security Training around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the WCDMA, UMTS and CDMA2000 Technology and Security Training course in manner understandable to lay audiences.
Audience/Target Group
The target audience for this training course:
- This course is aimed at audiences with some prior knowledge of wireless basics as well as CDMA technology who wish to study WCDMA/CDMA/CDMA2000 in depth with a particular focus on security issues.
Class prerequisites:
The knowledge and skills that a learner must have before attending this training course are:
- While there are no formal prerequisites for this course, some prior background in wireless technologies along with an understanding of CDMA concepts is required to benefit from this course.
Course Outlines:
PART 1: INTRODUCTION TO CELLULAR COMMUNICATIONS
- Cellular phone concept
- Base station
- Mobile station
- Mobile switching center
- Uplink and downlink
- Time-division duplexing
- Frequency division duplexing
- Comparisons
- Multiple access methods
- Frequency division multiple access
- Time division multiple access
- Code division multiple access
- WCDMA, UMTS, and CDMA2000 Technology and Security Training – Networking
- Circuit and packet switching
- History of cellular communications
- 1G to 4G
- Phone comparisons
PART 2: RADIO WAVE SPECTRUM, PROPAGATION, AND ANTENNAS
- The electromagnetic spectrum
- Types of radio services
- Spectrum characteristics
- Radiofrequency (RF) system measurements
- Power measurement using the decibel
- Signal-to-noise and interference ratios
- Antennas
- Terminology
- Gain and loss
- Law of reciprocity
- Base station antennas
- Smart antennas
- RF propagation in fixed and mobile environments
- Propagation mechanisms
- Path loss models
- Maximum range calculations
- Multipath and fading
- Cell planning and frequency reuse
- Frequency reuse calculations
- Cell sectoring
- Cell splitting
- Antenna downtilt
PART 3: MODULATION AND CODING
- Basic modulation methods
- Modulated signal structure
- Amplitude, frequency, and phase shift keying
- Bit error rate performance in Gaussian noise
- Advanced modulation methods
- Gaussian-filtered frequency shift keying (GFSK)
- Quadrature phase shift keying (QPSK)
- Quadrature amplitude modulation (QAM)
- Orthogonal frequency division multiplexing (OFDM)
- Spread spectrum systems
- Frequency hop
- Direct sequence
- Multiple access methods
- Error control
- Error detection
- Error correction
- Automatic repeat request
- WCDMA, UMTS, and CDMA2000 Technology and Security Training – Speech coding
- Speech quality rating
- Speech coding techniques
- Speech coders in practice
PART 4: 3GPP, 3GPP2, AND IEEE LAN/MAN STANDARDIZATION
- Motives behind 3G evolution
- Driving forces
- Radio access evolution
- Core network evolution
- Summary of 3GPP standards
- GSM, GPRS, and EDGE
- UMTS/WCDMA and HSPA
- LTE
- Summary of 3GPP2 cellular standards
- cdmaOne
- cdma2000
- EVDO
- Summary of IEEE LAN/MAN standards
- Wi-Fi
- Bluetooth
- WiMAX
- Market penetration and deployment status
PART 5: 3GPP2 CDMA: CDMAONE, CDMA2000, AND EVDO OPERATIONS
- CDMA codes and sequences
- Maximal length sequences
- Walsh codes
- Forward link channel
- Modulation
- Pilot channel
- Synchronization channel
- Control channels
- Paging channels
- Traffic channels
- Reverse link channels
- Pilot channel
- Access channel
- Control channels
- Traffic channels
- Call processing
- Initialization
- System access
- Authentication
- Resource management
- Power control
- Handoff
- Evolution-Data Optimized (EVDO) operation
- Requirements
- Reference model
- Forward and reverse channels
- Modulation and coding
- Power control
- Scheduling
PART 6: 3GPP CDMA: UMTS AND HSPA OPERATIONS
- UMTS architecture and protocols
- UTRAN radio network controller and NodeB
- Core network architecture and protocols
- UMTS physical layer
- WCDMA modulation and coding
- Transport channels
- User data transmission
- Signaling
- Cell search and access
- Radio interface protocols
- Medium access control
- Radio link control
- Packet data convergence protocol
- Radio resource control
- Radio resource management
- Power control
- Handovers
- Admission control
- High-speed packet access (HSPA) operation
- HSDPA physical layer structure
- HSDPA performance
- Enhanced uplink
PART 7: CDMA SYSTEM SECURITY
- Wireless security challenges
- Threat categories and attack methods
- General security setup process
- Attacks in mobile environments
- Spoofing and illicit use
- Man-in-the-middle
- Interception of data
- Denial of service
- Cryptography basics
- Symmetric and asymmetric cryptography
- Public key infrastructure
- Cryptographic attacks
- Access control and authentication
- Weak and strong authentication schemes
- Attacks on authentication
- Authorization and access control
- Smart card security
- Smart card basics
- Smart card communication
- Invasive and non-invasive attacks on smart cards
- Legacy GSM security operation and weaknesses
- GSM security model and encryption algorithms
- Attacks on GSM
- UMTS security
- Improvements to GSM security
- Confidentiality algorithm and extensions
- Integrity algorithm
- KASUMI kernel
- Authentication and key agreement (AKA)
- cdma2000 security
- Air interface parameters for authentication
- Secure parameters
- Challenge-response authentication procedure
- Authentication during MS registration
- Authentication during MS call origination and termination
- The CAVE algorithm for authentication and encryption
PART 8: LONG-TERM EVOLUTION (LTE) OPERATIONS
- General LTE operation
- System architecture
- Frequency bands
- Downlink and uplink modulation and resource structure
- Error control
- Spatial multiplexing
- Performance requirements
- LTE downlink
- User protocol architecture
- Channel mapping
- Logical, transport, and physical channel functions
- Cell acquisition
- IP packet processing and physical data mapping
- Control and radio resource management
- LTE uplink
- UL/DL similarities and differences
- Channel mapping
- Random access
- Data transfer
- Power save methods
- Link activity and capacity
- Wrap-up
- Course Recap and Q/A
- Evaluations
Request More Information