Objectives
After completing this course, the learner will be able to:
■ List threats and vulnerabilities in 5G networks
■ Match various mitigation measures with vulnerabilities
■ Sketch the end-to-end 5G security architecture
■ Identify unique security features of 5G networks
■ Identify roles of 5G network functions related to security procedures
■ Describe security mechanisms for infrastructure and network workload
Outline
1. Security in 5G: What and Why?
1.1 5G security challenges and mitigation
1.2 What's new in 5G security
2. 5G Security Architecture
2.1 End-to-end security framework in 5G
2.2 A closer look at 5G security - ZTA, microsegmentation, SASE
2.3 Key network security functions - AUSF, NRF, NEF, NSSAAF, etc.
2.4 Security for interworking and roaming - SEPP
3. 5G Security in a Cloud-Native Environment
3.1 Securing containerized 5G network functions
3.2 Threats in a container lifecycle
Putting It All Together
Final Assessment