The objective of this course is to give the member a solid and instinctive comprehension of what security in the remote frameworks is and how the security capacities are actualized in the GSM/GPRS/UMTS radio and center network.
The course concentrates both reporting in real time interface and the center network.
Having finished this course the member will have the capacity to see how security is executed, conveyed and overseen in GSM, GPRS and UMTS networks, comprehend security ideas, comprehend the advantages of new security strategies connected and how they are actualized.
Who Should Attend ?
Anyone needing in-depth knowledge of the security in the GSM family of wireless networks.
The course is essential for :
Objectives :
The goal of this course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in the GSM/GPRS/UMTS radio and core network. The course focuses both on the air interface and the core network.
Course outline:
The course concentrates both reporting in real time interface and the center network.
Having finished this course the member will have the capacity to see how security is executed, conveyed and overseen in GSM, GPRS and UMTS networks, comprehend security ideas, comprehend the advantages of new security strategies connected and how they are actualized.
Who Should Attend ?
Anyone needing in-depth knowledge of the security in the GSM family of wireless networks.
The course is essential for :
- Network security & wireless specialists
- Operators and manufacturers
- Wireless network researcher
- Academics
- Security engineers
- Researchers and consultants
Objectives :
The goal of this course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in the GSM/GPRS/UMTS radio and core network. The course focuses both on the air interface and the core network.
Course outline:
- Security Overview
- Overview of Wireless Security Requirements
- GSM Security Review
- GPRS Security Review
- UMTS Security Review
- UMTS Authentication and Key Management
- LTE Security Review
Comments
Post a Comment