MODULE 1 –LTE Technology
LTE-EPS
- EPS Network Architecture
- LTE EPS Protocols
- LTE PHY Layer
- LTE Interfaces (S1 Interface Protocol, X2 Interface Protocol, S11, S5/S8, S10 Interface Procedures, IMS and End-to-End
Signaling)
- Interworking with 3GPP and non-3GPP networks
LTE–EPC
- EPC Network Architecture
- EPC Protocols
- EPC Procedures
- IMS Protocols
- IMS Procedures & Services
- Security In EPC & IMS
- Policy and Charging Control in EPS and IMS
- EPC Interworking with Other Networks
MODULE 2 – LTE-Advanced (LTE-A)
- Overview of LTE-Advanced
- LTE-Advanced Network Architecture
- LTE-Advanced Enhancements
- Self-Organizing Networks and Heterogeneous Networks in LTE-Advanced
- Concepts behind Carrier Aggregation and Enhanced MIMO
- LTE Advanced Operational Procedures
MODULE 3 – Introduction to 5G Technology
- 5G Core Concepts
- Pervasive Networks
- Group Co-operative Relay
- Cognitive Radio Technology
- Dynamic Adhoc Wireless Networks
- Vandermonde-Subspace frequency division multiplexing (VFDM)
- IPv6 concepts
- High-altitude stratospheric platform station (HAPS) systems
- Wearable devices with AI capabilities
- unified global standard
- World Wide Wireless Web (WWWW)
- Massive Dense Networks (Massive Distributed MIMO)
MODULE 4 - OVERVIEW OF SECURITY CONCEPTS
- Basic security concepts
- Authentication
- Privacy
- Integrity
- Authorization
- Non-repudiation
MODULE 5 - Encryption
- Encryption Technologies
- Cryptography Keys
- Symmetric and Asymmetric
- Ciphers
- Cipher Suites
- Certificates
MODULE 6 - Overview of Wireless Security Requirements
- Wireless security needs
- Basic GSM, GPRS, UMTS and LTE security functions
MODULE 7 - GSM, EGPRS, UMTS/HSPA/HSPA+ and LTE Security Framework
- GSM, EGPRS and UMTS/HSPA/HSPA+ and LTE Security Functions
- GSM Security Review
- GPRS Security Review
- UMTS Security Overview
- LTE Security Overview
- Ciphering, Authentication and Authorization Procedures
- RAN Security
- Core Network Security
- Lawful Intercepttion (LI)
- Mobile Application Part Security
- MAPsec overview
MODULE 8 - UMTS Security Architecture
- GSM, EGPRS Security Architecture
- UMTS and HSPA/HSPA+ security features
- Network access mechanisms
- UMTS authentication and authorization procedures
- Key agreement
li>
- Local authentication
- UMTS ciphering procedures
- Security threats to UMTS and LTE
MODULE 9 - Security in UTRAN
- Typical threats in UTRAN
- Mutual authentication
- Cryptography for authentication
- UTRAN encryption
- Integrity protection of RRC signalling
MODULE 10 - Security in UMTS Core Network
- Typical Threats in Core Network
- Denial of Services
- IPSec
- Authentication Server
- Network Domain
- MAP application layer security
MODULE 11 - Authentication and Key Management (AKA)
- Authentication parameters
- AV and K
- RAND
- SQN and AK
- AMF and MAC
- CK and IK
- RES and X-RES
- AUTN and AUTS
- Normal AKA procedure
- AKA procedure in the AuC
- AKA procedure in the USIM
- AKA procedure in the VLR/SGSN
MODULE 12 - AKA Algorithms
- AKA Functions with their outputs
- Cryptographic functions and algorithms
- Key generating functions
- Authentication parameters
- Integrity function
- Confidentiality function
- f0, f1 and f1*
- f2, f3 and f4
- f5, f5*, f8 and f9
MODULE 13 - LTE (Long Term Evolution) Security
- Security procedures performed within the Evolved Packet System (EPS)
-
- Evolved Packet Core (EPC)
- Evolved UTRAN (E-UTRAN)
- LTE/SAE and Home (e)NB Security
- System Architecture Evolution (SAE) Security Architecture
- Authentication and Key Agreement
- HSS Authentication Data and MME
- Overview of Diameter Protocol
- Challenge-response Authentication and Key Agreement Procedure between MME and UE
- Confidentiality and Integrity of Signaling
- User Plane Confidentiality
- Cryptographic Network Separation
- Home (e) Node B security
- Threats
- Countermeasures
- Security Performance Measurements
- Managing Mobile App Security
MODULE 14 - LTE Security Procedures
- Security Procedures between UE and EPC Network Elements
- Security Procedures between UE and EPC Access Network Elements
- Security mechanisms for non-access stratum signaling
- Security interlocking between E-UTRAN and UTRAN
- Security interworking between E-UTRAN and GERAN