5G Security & Privacy Practices

5G    |    Intermediate
  • 12 videos | 59m
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 76 users Rating 4.4 of 76 users (76)
While 5G opens up new opportunities, it also introduces new challenges. These include security and privacy concerns. Many of the characteristics of 5G can be leveraged by malicious attackers to compromise networks and the services they carry. However, with the appropriate deployment methodologies, virtually all of these vulnerabilities can be addressed to ensure a safe and secure network for all users. Use this course to investigate various aspects of security for 5G networks. Begin by exploring security and privacy in general before taking a closer look at the potential vulnerabilities inherent to 5G. Finally, examine the various built-in security mechanisms used to mitigate these threats, as well as the best practices and policies employed to ensure 5G remains safe for all to use. When you're done, you'll be able to provide solutions and workarounds for the primary security and privacy issues pertinent to 5G.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the history of security in telecommunications as well as the importance of privacy, especially in today’s highly connected network
    Identify the most common motivations behind attacks on telecom networks, including acquiring information and disrupting services
    Discuss the fundamental principles involved in the implementation of network security and the methodologies used to achieve it
    Describe the network vulnerabilities that are unique to 5g networks
    Examine how the very architecture of 5g vastly increases the number of potentially vulnerable entry points into the network due to various technological innovations
  • Describe the 5g security vulnerabilities introduced with the advent of virtualization and slicing mechanisms
    Outline how the use of non-standalone installations can introduce new vulnerabilities that must be dealt with
    List the various solutions made available to both equipment vendors as well as mobile network operators to ensure safe communication over 5g networks
    List the various standards that have been put into place in 5g networks by design to ensure network security on 5g infrastructure
    Describe how security policies must be system-wide, where telecom networks such as 5g are only one of many important components
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 27s
  • 5m 57s
    Upon completion of this video, you will be able to outline the history of security in telecommunications as well as the importance of privacy, especially in today's highly connected network. FREE ACCESS
  • Locked
    3.  Attacker Motivations for Telecom Network Attacks
    5m 22s
    During this video, you will learn how to identify the most common motivations behind attacks on telecom networks, including acquiring information and disrupting services. FREE ACCESS
  • Locked
    4.  Network Security Fundamentals and Methodologies
    5m 50s
    Find out how to discuss the fundamental principles involved in the implementation of network security and the methodologies used to achieve it. FREE ACCESS
  • Locked
    5.  Security Concerns Unique to 5G
    5m 52s
    Learn how to describe the unique network vulnerabilities of 5G networks. FREE ACCESS
  • Locked
    6.  Multiplication of Points of Entry in 5G Architecture
    6m 21s
    In this video, you will learn how 5G's architecture creates more opportunities for cyberattacks. FREE ACCESS
  • Locked
    7.  Virtualization and Slicing Vulnerabilities in 5G
    5m 42s
    During this video, you will learn how to describe the 5G security vulnerabilities introduced with the advent of virtualization and slicing mechanisms. FREE ACCESS
  • Locked
    8.  Mixing 4G and 5G Vulnerabilities
    3m 46s
    In this video, discover how non-standalone installations can introduce new vulnerabilities that must be dealt with. FREE ACCESS
  • Locked
    9.  Solutions to 5G Network Security & Privacy Concerns
    5m 50s
    Discover how to list the various solutions made available to both equipment vendors and mobile network operators to ensure safe communication over 5G networks. FREE ACCESS
  • Locked
    10.  Built-in 5G Security Standards
    5m 53s
    In this video, you will list the various standards that have been put into place in 5G networks to ensure network security. FREE ACCESS
  • Locked
    11.  A System-wide Approach to 5G Security
    4m 47s
    After completing this video, you will be able to describe how security policies must be system-wide, where telecom networks such as 5G are only one of many important components. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 14s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 92 users Rating 4.6 of 92 users (92)
Rating 4.7 of 62 users Rating 4.7 of 62 users (62)
Rating 4.5 of 75 users Rating 4.5 of 75 users (75)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 637 users Rating 4.7 of 637 users (637)
Rating 4.7 of 69 users Rating 4.7 of 69 users (69)
Rating 4.6 of 74 users Rating 4.6 of 74 users (74)