LTE Security and LTE Advanced Security Training

LTE Security and LTE Advanced Security Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

LTE Security Training and LTE Advanced Security Training Course

LTE Security Training discusses how LTE/E-UTRAN and EPC security substantially extends GSM, 3G/UMTS, and IMS security. LTE Security and LTE Advanced Security Training also encompasses the E-UTRAN, EPC and IMS security architectural. The LTE Security Training and LTE Advanced Security Training course presents in detail the security mechanisms employed to meet current and future LTE requirements.

Customize It:

• If you are familiar with some aspects of this LTE Security and LTE Advanced Security Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Related Courses:

LTE and IMS Technologies and How They Interwork Training
LTE Advanced System Techniques Training

Objectives:

Upon completing this LTE Security and LTE Advanced Security Training course, learners will be able to meet these objectives:

• Shows how GSM and 3G/UMTS security was enhanced and extended to meet the requirements of LTE and
• LTE/Advanced fourth generation systems
• Shows concepts behind LTE/E-UTRAN, LTE-Advanced, EPC, IMS and Voice over LTE (VoLTE) Security
• Explains why LTE security solutions are designed

LTE Security and LTE Advanced Security Training – Course Syllabus:

◾Evolution of Cellular Systems from GSM to LTE-Advanced
◾Introduction to LTE and LTE-Advanced
◾Basic Security Concepts
◾Basic Cryptographic Concepts
◾Principles of GSM Security
◾GSM Cryptographic Algorithms
◾Principles of Third-Generation (3G) Security
◾UMTS Cryptographic Algorithms
◾3G–WLAN Interworking
◾Generic Bootstrapping Architecture (GBA /GAA)
◾Security Mechanisms of 3G–WLAN Interworking
◾Cryptographic Algorithms for 3G–WLAN Interworking
◾EPS Security Architecture
◾Requirements and Features of EPS Security
◾EPS Authentication and Key Agreement (AKA)
◾EPS Authentication and Key Agreement Procedure
◾Key Hierarchy
◾EPS Protection for Signaling and User Data
◾NAS Signaling Protection
◾AS Signaling and User Data Protection
◾The AS (RRC and UP) and NAS Security
◾NAS and AS protection keys
◾The eNB cryptographically keys
◾NAS (EPC/UE) level AKA procedure (KASME)
◾key identifier (KSIASME)
◾Certificate Enrolment for Base Stations
◾Security in Intra-LTE State Transitions and Mobility
◾Transitions to and from Registered State
◾Periodic Local Authentication Procedure
◾EPS Cryptographic Algorithms
◾Ciphering Algorithms and Keys
◾Integrity Algorithms and Keys
◾Key Derivation Algorithms
◾Interworking Security between EPS and Other Systems
◾Security for IMS and Voice over LTE (VoLTE)
◾IMS (Signaling and Media) security
◾Rich Communication Suite (RCS) and Voice over LTE
◾Security for Home Base Station Deployment
◾Closed Subscriber Groups and Emergency Call Handling

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email