5G Security & Privacy Practices
5G
| Intermediate
- 12 videos | 59m
- Includes Assessment
- Earns a Badge
While 5G opens up new opportunities, it also introduces new challenges. These include security and privacy concerns. Many of the characteristics of 5G can be leveraged by malicious attackers to compromise networks and the services they carry. However, with the appropriate deployment methodologies, virtually all of these vulnerabilities can be addressed to ensure a safe and secure network for all users. Use this course to investigate various aspects of security for 5G networks. Begin by exploring security and privacy in general before taking a closer look at the potential vulnerabilities inherent to 5G. Finally, examine the various built-in security mechanisms used to mitigate these threats, as well as the best practices and policies employed to ensure 5G remains safe for all to use. When you're done, you'll be able to provide solutions and workarounds for the primary security and privacy issues pertinent to 5G.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline the history of security in telecommunications as well as the importance of privacy, especially in today’s highly connected networkIdentify the most common motivations behind attacks on telecom networks, including acquiring information and disrupting servicesDiscuss the fundamental principles involved in the implementation of network security and the methodologies used to achieve itDescribe the network vulnerabilities that are unique to 5g networksExamine how the very architecture of 5g vastly increases the number of potentially vulnerable entry points into the network due to various technological innovations
-
Describe the 5g security vulnerabilities introduced with the advent of virtualization and slicing mechanismsOutline how the use of non-standalone installations can introduce new vulnerabilities that must be dealt withList the various solutions made available to both equipment vendors as well as mobile network operators to ensure safe communication over 5g networksList the various standards that have been put into place in 5g networks by design to ensure network security on 5g infrastructureDescribe how security policies must be system-wide, where telecom networks such as 5g are only one of many important componentsSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 27s
-
5m 57sUpon completion of this video, you will be able to outline the history of security in telecommunications as well as the importance of privacy, especially in today's highly connected network. FREE ACCESS
-
5m 22sDuring this video, you will learn how to identify the most common motivations behind attacks on telecom networks, including acquiring information and disrupting services. FREE ACCESS
-
5m 50sFind out how to discuss the fundamental principles involved in the implementation of network security and the methodologies used to achieve it. FREE ACCESS
-
5m 52sLearn how to describe the unique network vulnerabilities of 5G networks. FREE ACCESS
-
6m 21sIn this video, you will learn how 5G's architecture creates more opportunities for cyberattacks. FREE ACCESS
-
5m 42sDuring this video, you will learn how to describe the 5G security vulnerabilities introduced with the advent of virtualization and slicing mechanisms. FREE ACCESS
-
3m 46sIn this video, discover how non-standalone installations can introduce new vulnerabilities that must be dealt with. FREE ACCESS
-
5m 50sDiscover how to list the various solutions made available to both equipment vendors and mobile network operators to ensure safe communication over 5G networks. FREE ACCESS
-
5m 53sIn this video, you will list the various standards that have been put into place in 5G networks to ensure network security. FREE ACCESS
-
4m 47sAfter completing this video, you will be able to describe how security policies must be system-wide, where telecom networks such as 5G are only one of many important components. FREE ACCESS
-
1m 14sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.