Mobile Cellular Security Training
Mobile Cellular Security Training course with hands-on Exercises (Online, Onsite and Classroom Live)
When 1st generation cellular networks were launched in the early 80s, security wasn’t included anywhere in these many different systems. Today, those of us that are old enough to remember these early days of cellular may be somewhat puzzled as to why it wasn’t built-in from the start. However, for those that know a fair amount about the history of Information and Communications Technology, it just seemed to happen that way. Today, we see a world ignited by the fast-paced technology of mobile broadband, first experienced with 4G a decade ago. The world is now seeing the next generation rollout of 5G services. We can expect a lot, because there is a more ambitious agenda and higher expectations of how 5G services will change our daily lives.
There is a lot riding on mobile technologies that affects each one of us. Our society has become well aware of the shortcomings of information security. It seems like almost a daily event when we read news stories about some major breach of security that has exposed personal data, illegal funds transfers, corporate espionage, etc. Thus, we are all keenly aware of the important role that electronic security must play, when it comes to protecting our privacy, financial transactions, and other data types that must be safely guarded.
Mobile security began with 2nd generation systems. That is also where this Mobile Cellular Security Training (A Systematic View) course begins. This Mobile Security Training (A Systematic View) course is designed for individuals who already have a good understanding of how mobile cellular services function. The goal of this Mobile Cellular Security Training course is to expand on how security technology and protocols have evolved from the early 90s to today’s 5G services. This Mobile Cellular Security Training (A Systematic View) course leverages legacy standards, showing how ideas and concepts were used to construct security standards. Each generation of mobile security standards influenced the next. As flaws were discovered in the design of these older security protocols, security experts learned important lessons, continuing to develop more secure systems and better methodologies to protect data against cybercrime.
The main security focus of this Mobile Cellular Security Training (A Systematic View) course is on 4G and 5G systems. These two generations will remain tightly intertwined, well into the next decade. However, 5G mobile networks are only a part of the security landscape. There are older, reliable underpinnings of mobile security that are rapidly changing deployment models for massive Machine Type Communications (mMTC).
In the past, cellular technology relied on the physical SIM card, securely containing the mobile operator’s security credentials. Now, with Over-The-Air (OTA) provisioning of embedded SIMs (eSIMs), things are changing rapidly. If the industry fails to provide robust security for these newer provisioning methods, it will create a security catastrophe. Countries around the world are experiencing the mass introduction of eSIMs, remote SIM provisioning and now, integrated SIMs (iSIMs). Coverage of these technologies are important subjects in this course. Another complex topic, covered in this course, are the multitude of subscriber and network identifiers used in mobile networks, with each generation, more complex schemes of identifiers are used. Many of these are required to increase the security measures for these newer standards.
5G is a big focus of this Mobile Security Training course, but the learner is not expected to know 5G systems and technology. This Mobile Cellular Security Training (A Systematic View) course is the first part in a two-part series. The second course focuses on the 5G technologies. It is the way this Mobile Cellular Security Training course is laid out, providing the foundations for the next leap to part II: The Engineering of 5G Systems. Both courses are detail-rich in describing how these mobile cellular systems operate and the protocols behind them.
Duration: 3 days
RESOURCES
- Mobile Cellular Security Training – https://www.wiley.com/
- Mobile Cellular Security Training – https://www.packtpub.com/
- Mobile Cellular Security Training – https://store.logicaloperations.com/
- Mobile Cellular Security Training – https://us.artechhouse.com/
- Mobile Cellular Security Training – https://www.amazon.com/
RELATED COURSES
- 5G Wireless Comprehensive Technical Overview Training
- 5G Wireless Security Training
- Mobile Security and Technical Overview of the 5G System Training
- Mobile Wireless and Cellular Communications Training Part I
CUSTOMIZE It
- We can adapt this Mobile Cellular Security Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Mobile Cellular Security Training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Mobile Cellular Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Mobile Cellular Security Training course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this Mobile Cellular Security Training course:
- This Mobile Cellular Security Training course is designed for attendees that have a strong knowledge of how mobile cellular systems function. Attendees should have a working knowledge of how mobile devices attached to the network, basic multiple access technologies used in RANs. It is important to have an understanding of mobile core network functions and domains, and also a basic knowledge of transport networks/, used to connect RAN and core networks.
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Mobile Cellular Security Training course are:
- Have previous experience in the field or classroom training on 2G and 3G networks
- Have some experience or training with flow diagrams describing service connections
- Have a thorough understanding of circuit-switched and packet-switched domains
- Understand the differences between signaling (control) and user planes
- Have a solid understanding of TCP/IP protocols and how packet network operate, in general
- Have some background in the foundations of Information Security
- Having a background in mobile cellular security is a plus, but is not necessary
Mobile Security Training - OBJECTIVES
Upon completing this Mobile Cellular Security Training course, learners will be able to meet these objectives:
- Trace the evolution in Radio Access Network (RAN) architectures for cellular networks, from the early standards through 5G
- List the features in a 5G Access Network and describe the advantages of the architecture
- Understand the structure of the 3GPP’s three Technical Specification Groups (TSGs), and how to locate specific specifications when needed
- See the changes to the RAN architecture, from 2G to 5G, and describe how the significant changes have improved cell coverage and security
- List the three major International Mobile Telecommunications requirements, produced by the ITU=R that served as a blueprint for 3G, 4G and 5G mobile systems
- Describe the features and weaknesses of 2G GSM & 2.5G GPRS mobile security
- Describe the features and weaknesses of 3G UMTS mobile security
- Describe the features and weaknesses of 4G LTE mobile security
- Describe the features and potential concerns for 5G mobile security
- List the authentication vectors introduced in 3G UMTS and describe the function of each
- List the authentication vectors introduced in 4G LTE and describe the function of each
- Describe how authentication procedures developed for 3G influenced the 4G design, and how 4G has influenced 5G authentication
- Define the mechanisms used for encryption of mobile traffic and describe the significant changes made with each generation
- List the LTE security stratums and the functions that are performed over each
- Describe each of the three NAS Layer states in LTE
- Define each of the 5G Phase-I security tasks
- Describe the two phases of 5G security and the use cases they affect
- Diagram the security functions in the 5G architecture
- Describe the differences between the two Authentication and Key Agreement (AKA) mechanisms defined for 5G Access Networks
- Sketch the security trust model for 5G networks and describe the concepts behind the design
- Explain the 5G key hierarchy used and the increased security protection it provides, compared with the key hierarchy used in 4G
- Define the structure for the Integrated Circuit Card Identifier (ICCID), used to uniquely identify SIMs
- Describe the structure for the International Mobile Subscriber Identity (IMSI), and know how to perform global lookups
- Describe the structure of the Temporary Mobile Subscriber Identity (TMSI)
- Describe the structure of the International Mobile Equipment Identity (IMEI)
- List the global network and subscriber identifiers used in 2G/2.5G networks
- List the global network and subscriber identifiers used in 3G networks
- List the global network and subscriber identifiers used in 4G networks
- List the global network and subscriber identifiers used in 5G networks
- Describe the function of mobility management for 3G, 4G, and 5G networks
- Define the two Subscription Permanent Identifier (SUPI) formats used in 5G
- Define the 5G Permanent Equipment Identifier (PEI) formats used for 5G devices
- Define the Structure of Subscription Concealed Identifier (SUCI) and explain its use
- List the steps involved with how the UE conceals the SUPI and how the UDM in the network de-conceals it
- Understand how 4G and 5G GUTIs are mapped when an inter-RAT handover is performed for a UE between LTE and 5G networks
- Describe the difference between the two output schemes used for the Elliptic Curve Integrated Encryption (ECIES)
- Describe two types of Fixed Network Residential Gateways (FNRGs) that are supported for 5G Fixed Mobile Convergence (FMC)
- Define the logical structure for the UICC
- Describe the different Applications Toolkits (SDKs) for SIMs (2G, 3G, 4G, 5G)
- Describe the Universal SIM (USIM) used in 3G, 4G and 5G devices
- Define the properties of an embedded SIM (eSIM), and its primary uses
- List the different SIM file types and related security conditions
- Describe the differences between M2M and IoT technologies
- Describe the process that was developed for remote provisioning of SIMs
- Understand how consumer remote eSIM provisioning differs from M2M IoT provisioning
- Describe the basic architecture of the integrated SIM (iSIM) and explain how it differs from eSIMs
Mobile Security Training - COURSE SYLLABUS
Global Standardization of Mobile Cellular Networks
- Changing Nature of Mobile Communications
- Rationale Behind 2G to 4G Security
- Global Radio Spectrum Management
- ITU: Global Telecom Standards Organization
- ITU Radiocommunications Sector (ITU-R)
- World Radio Conferences (WRCs)
- IMT Developments and Deployment
- Spectrum in Demand by Mobile Network Operators
- From Pre-Cellular to Mobile Cellular Networks
- Mobility Support within PLMNs
- MSISDN Structure Based on ITU-T E.164
- Domains Supported by 2G & 3G Mobile Networks
- GSM/GPRS & UMTS Interfaces and Nodes
- Standalone BS: Conventional Cell Site Architecture
- Overview of 3GPP and its Organizational Structure
- 4G LTE Mobile Cellular Service and Architecture
- The IP Multimedia Subsystem (IMS) Architecture
- Contemporary BS in Distributed RAN Architecture
- Centralized RAN Architecture (Fronthaul & Backhaul)
- 5G RANs: Backhaul, Midhaul and Fronthaul
- 5G Transport Architecture
- 5G International Mobile Telecommunications 2020
- 5G Use Cases and Cellular Network Services
- 5G Requirements
- 3GPP for Global 5G Standard
- Non-Standalone Architecture (NSA) vs. Standalone
- Signals Interception Challenges with RF Propagation
- 5G Beamforming and Beamsteering Antennas
Concepts of Basic Information Security (InfoSec)
- 2G: GSM Security
- GSM Subscriber Identity Modules (SIMs)
- GSM Authentication
- GSM Encryption
- Security Vulnerabilities with GSM Networks
- Overview of 3G UMTS Security
- UMTS Security Features
- Generating UMTS Authentication Vectors (AVs)
- UMTS Mutual Authentication Process
- USIM-Based Encryption for UMTS
- UMTS Key Distribution for Encryption
- Security Vulnerabilities with UMTS Networks
- Overview of 4G LTE Security
- LTE Security Stratums
- Generating Authentication Vectors (AVs) in LTE
- Overview of 4G LTE Security
- LTE Security Stratums
- Generating Authentication Vectors (AVs) in LTE
- LTE Key Hierarchy
- LTE Security Procedures:
- Authentication
- NAS Security Setup
- AS Security Setup
- Mobile Security Architecture Evolution: 2G Through 4G
- Security Threats and Vulnerabilities for LTE
- Overview of 5G Security
- Security Functions in 5G Architecture
- Authentication and Key Agreement (AKA) within a 5G System
- Security Trust Model for 5G Networks
- Non-Standalone (NSA) Security
- 5G Key Hierarchy
Identifiers Used in Mobile Cellular Networks
- Integrated Circuit Card Identifier (ICCID) Unique Global Identifier for each SIM
- Unique Global Identifiers used in 2G, 3G, 4G, and now 5G: International Mobile Subscriber Identity (IMSI)
- Temporary Mobile Subscriber Identity (TMSI)
- Unique Global Identifiers used in 2G, 3G, 4G, and now 5G: International Mobile Equipment Identities (IMEIs)
- GSM Global Identifiers: Four Parameters
- System Aspects of 3G UMTS Mobility Management
- 3G Registration Area Definitions for Paging & Mobility Management
- LTE Non-Access Stratum (NAS) Layer States
- EPS Connection Management (ECM) RRC Layer States
- 4G LTE Identifiers
- Overview of 5G Subscriber Related Identities
- State Transitions Between EMM and ECM: Assigning GUTI and C-RNTI for UE Identification by the LTE Network
- Overview of 5G Subscriber Related Identities
- 5G Subscriber Permanent Identifier (SUPI) Formats
- Structure of Subscription Concealed Identifier (SUCI)
- Concealing the Subscriber Permanent Identifier (SUPI)
- 5G Permanent Equipment Identifier (PEI)
- Structure of the 5G-GUTI and the 5G-S-TMSI
- 5G Network Related Identities
- Inter-RAT Handovers: Mapping the 4G-GUTI to 5G-GUTI
- 5G Fixed Mobile Convergence (FMC)
The Evolution of Subscriber Identity Modules (SIMs)
- Universal Integrated Circuit Card (UICC) Logical Structure
- Application Toolkits for SIMs
- USIM Application Toolkit (USAT) Features
- USIM Application Toolkit (USAT): Location Information
- Characteristics of the Universal Integrated Circuit Card (UICC)
- Expanding Terminology for SIMs
- Embedded eSIM (eUICC)
- Mobile Security: Distribution of Shared Secret Keys
- Mobile Security: Distribution of Shared Secret Keys
- File Types and Related Security Access Conditions
- Typical SIM Card File System Structure for GSM (2G)
- Universal SIM (USIM) File System Structure for 3G, 4G & 5G Access
- IMS Application Data File (ISIM)
- USIM File System Structure: Security, Unique Subscriber Identity and Service Table
- USIM Card File System Structure for 5G
- Combination SIM (Combi SIM) Slots for Smartphones
Provisioning SIMs and Embedded SIMs (eSIMs)
- The Difference Between M2M and IoT
- MFF2 SIM Linear Distribution & Subscription Model for M2M
- Issues with using MFF2 SIMs for M2M Devices
- How eSIMs are Changing the Market
- Introduction to Embedded SIMs (eSIMs)
- Overview of eUICC Service Provider Profiles
- Remote Provisioning using eSIMs
- Two Remote Provisioning Methods for Operational Profiles
- Two Provisioning Models for eSIMs
- GSMA’s M2M Remote Provisioning Architecture
- GSMA’s Consumer Remote Provisioning Architecture
- How Consumer Remote SIM Provisioning Works
- eUICC Architecture Overview
- Operator Profile Download and Installation Flow
- The Integrated SIM (iSIM)
Mobile Cellular Security Training Course: Recap, Q/A, and Evaluation
Whether you are looking for general information or have a specific question, we want to help.
Request More Information