SEGURIDAD 5G
Precio curso virtual en directo: 1.730€
Precio curso virtual grabado: 1.210€
Del 05 al 08 de abril de 2022
*Descuentos por volumen o compañía*
¿Quieres más información acerca de precios y descuentos?
CONTÁCTANOSEste curso presenta las amenazas antiguas y nuevas, aspectos de seguridad, requisitos, recomendaciones de varias organizaciones, además de las funciones y procedimientos nuevos y mejorados diseñados para mejorar la seguridad de las futuras redes 5G para la comunicación con usuarios regulares y el número creciente de dispositivos IoT.
El curso de capacitación comienza con una breve introducción a la arquitectura del sistema 5G, varios peligros, amenazas y escenarios de ataque y una breve introducción a las técnicas criptográficas básicas utilizadas en la comunicación digital. A esto le sigue una presentación de los requisitos de seguridad en el sistema 5G y las recomendaciones de varias organizaciones. Las siguientes partes del curso presentan varios mecanismos de seguridad estandarizados y sus detalles para asegurar la comunicación con usuarios/dispositivos, dentro de la red, hacia entidades externas y otras redes.
Descargar folletoAGENDA
- What is security: confidentiality, integrity, identity protection, intrusion prevention, etc.
- Security aspects of end-user and IoT devices, radio access network, core network, application servers and communication with other networks.
- 5G system introduction: architecture, relation to 4G networks, selected deployment scenarios, use cases, Service-Based Architecture principles, Centralized RAN option.
- Possible attack vectors: malware in devices/app servers, misbehaving UEs, compromised base stations, fake base stations, passive air interface monitoring, active interception, physical tampering with IoT devices, etc.
- Overview of UE security functions, mobility and session-related procedures, identifiers.
- Basic cryptographic techniques: symmetric/asymmetric encryption, key exchange, hash functions, signatures, certificates, etc.
- Overview of assets and threats in Generic Network Products as identified by 3GPP.
- Overview of assets, threats, threat agents as identified by ENISA.
- 3GPP 5G security requirements on UE, gNB, Centralized RAN, AMF, UDM, AUSF, NRF, SEPP, NEF, and Network Functions using Service-Based Interfaces.
- NGMN Alliance recommendations on 5G security for: network and access, DoS/DDoS attacks prevention, network slicing, Multi-access Edge Computing, low latency communication, etc.
- GSM Association recommendation on security for: network operators, IoT service ecosystem and IoT end-device ecosystem.
- GSM Association: lists of critical and high-priority security recommendations, details of selected recommendation examples.
- Network Equipment Security Assurance Scheme and 3GPP Security Assurance Specifications (SCAS), selected SCAS examples for gNB, AMF, etc.
- Overview of ETSI recommendations for NFV security.
- Evolution of the trust model and principles of Zero-Trust Security approach to networks security.
- Evolution from 2G to 5G: authentication, ciphering, integrity protection.
- 5G air interface security algorithms.
- Pre-R99 SIM and R99+ USIM security features comparison.
- 5G system authentication methods: 5G AKA and EAP-AKA’.
- Visited PLMN verification: handling of XRES* and HXRES*.
- SUPI protection: concealment and de-concealment to/from SUCI, selected details of the protection schemes.
- Protection of initial NAS messages.
- EPS security key hierarchy.
- 5GS security key hierarchy, for NR and non-3GPP access, for 5G-AKA and EAP-AKA’ authentication methods.
- Selected details of Key Derivation Functions in 5GS key hierarchy.
- Air interface user-plane security.
- RAN-based periodic local re-authentication.
- Security for non-3GPP access: untrusted Wi-Fi, trusted Wi-Fi, wireline.
- Selected details of secure UE parameters update from HPLMN procedure.
- “Vertical” security for 4G/5G network exposure via SCEF and NEF.
- Security of Service Based Architecture of 5G System and non-SBA 5G interfaces.
- Security principles for inter-operator communication via SEPP and pre-5G interfaces.
- PRINS protocol overview and security capability negotiation between SEPPs.
- Security comparison of protocols for roaming communication: MAP, Diameter, HTTP.
- Network slice security principles, Network Slice-Specific Authentication and Authorization.
- NWDAF-based anomaly detection
- Securing UE-AF communication with Authentication and Key Management for Applications using 3GPP UE credentials
- Overview of security handling at intra-/inter-RAT mobility, horizontal and vertical key derivation for forward security.
REQUISITOS PREVIOS:
Se requiere un nivel medio de conocimiento técnico de la estructura y procedimientos en las redes 5G. Recomendamos nuestro curso «Arquitectura de red CORE 5G» para obtener conocimientos básicos.

¡Inscríbete ahora!
