UMTS, HSPA, HSPA+ and LTE Security Training

UMTS, HSPA,  HSPA+ and LTE Security Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

Why Choose ENO for Your UMTS | HSPA | HSPA+ and LTE Security Training Course

Having completed this UMTS, HSPA, HSPA+ and LTE Security Training course the participant will be able to understand how security is implemented, deployed and managed in UMTS, HSPA, HSPA+ and LTE networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented.

Customize It:

• If you are familiar with some aspects of this UMTS, HSPA, HSPA+ and LTE Security Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Related Courses:

LTE and UMTS | HSPA Location Based Services for E911 Training
LTE/HSPA Intertechnology Optimization Training

What You Will Learn:

Upon completing this UMTS, HSPA, HSPA+ and LTE Security Training course, learners will be able to meet these objectives:

• The goal of this course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in UMTS/HSPA/HSPA+ radio and core network. The course focuses both on the security on the air interface and the core network.

UMTS, HSPA, HSPA+ and LTE Security Training – Course Syllabus:

Overview of Security Concepts

◾Basic security concepts
◾Authentication
◾Privacy
◾Integrity
◾Authorization
◾Non-repudiation

Encryption Fundamentals

◾Encryption Technologies
◾Cryptography Keys
◾Symmetric and Asymmetric
◾Ciphers
◾Cipher Suites
◾Certificates

Overview of Wireless Security Requirements

◾Wireless security needs
◾Basic GSM, GPRS and UMTS security functions

UMTS Security Architecture

◾Overview of UMTS Network
◾Overview of HSPA/HSPA+
◾UMTS security features
◾Network access mechanisms
◾UMTS authentication and authorization procedures
◾Key agreement
◾Local authentication
◾UMTS ciphering procedures
◾Security threats to UMTS
◾Security Evolution in E-UTRAN/LTE and EPC

Security in UTRAN

◾Typical threats in UTRAN
◾Mutual authentication
◾Cryptography for authentication
◾UTRAN encryption
◾Integrity protection of RRC signalling
◾Security in E-UTRAN

Security in UMTS Core Network

◾Typical Threats in Core Network
◾Denial of Services
◾IPSec
◾Authentication Server
◾Network Domain
◾MAP application layer security

UMTS Authentication and Key Management (AKA)

◾Authentication parameters
◾AV and K
◾RAND
◾SQN and AK
◾AMF and MAC
◾CK and IK
◾RES and X-RES
◾AUTN and AUTS
◾Normal AKA procedure
◾AKA procedure in the AuC
◾AKA procedure in the USIM
◾AKA procedure in the VLR/SGSN

AKA Algorithms

◾AKA Functions with their outputs
◾Cryptographic functions and algorithms
◾Key generating functions
◾Authentication parameters
◾Integrity function
◾Confidentiality function
◾f0, f1 and f1*
◾f2, f3 and f4
◾f5, f5*, f8 and f9

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email