TS-270 LTE SECURITY AND INSECURITY
Category:
- Learn about modern telecom, mainline and mobile, systems and networks for 4G LTE mobile network service. Understand the security mechanism of LTE and the Evolved Packet Core network security and vulnerabilities. Learn in detail the various problems that may happen in LTE networks and define a plan of study to become an LTE Network auditor.
WHAT ATTENDEES WILL RECEIVE
- Copy of the presenter’s slides
- Custom Training material for the course
PREREQUISITES FOR THIS COURSE
- Telecom Security 101 and 102
- TS-201
COURSE DURATION
- Two Days
COURSE ACCREDITATION
- EON IT – A Certification Body assigned by IASME (National Cyber Security Centre (NCSC))
- P1 Security France
Course Outline
LTE Introduction;
- LTE Security architecture;
- LTE Network elements overview and security roles & functions;
- LTE Communication security, cryptography and key management;
- Study of LTE protocols:
- S1AP;
- X2AP;
- Diameter;
- GTP-C;
- GTP-U;
- GTP v2;
- GTP;
- Typical attacks on LTE infrastructure;
- Recap of SS7 attack scenarios and comparison to 4G;
- Role of legacy in LTE security;
- Network elements and their functions: HSS, DRA/DEA, MME, PCRF, eNodeB, PGW, SGW
DRA remote and RCE compromise via Diameter;
- Vulnerabilities in VoLTE;
- Analysis of Generic LTE Network element and vulnerabilities:
- Diameter security and comparison to SIGTRAN and Radius protocols;
- Diameter fuzzing and scanning;
- Diameter in a roaming context;
- NAS security, protocol review and known attacks;
- SCTP protocol basics, scanning and attack scenarios;
- SGW – PGW infrastructure and design and GTPv2 scanning and fuzzing;
- S1AP interface protocol study and known vulnerabilities;
- Attack scenarios over the S1AP interface;
- Attacking O&M (OAM & Management) of network elements;
- GRX / IPX compromise case studies, architecture and design and known vulnerabilities;
- Scenarios of attack of LTE network:
- Radio-based, subscriber role;
- Infrastructure-based, transmission or RAN vector;
- Internal-based attack;
- Interconnect based attack scenarios.
Related Courses
tdta
Security Strategies and Policies in a 5G World
Add to Wishlist
Members only
tdta
With 5G Proofs of Concepts and early deployment, Market adoption and direction in terms of usage are set or appearing, and operators are preparing ...
Add to Wishlist
Free
tdta
Learn about modern telecom, mainline and mobile, systems and networks for 4G LTE mobile network service.
Add to Wishlist
Free
tdta
Learn about modern telecom and mobile system and networks in the context of IMS and NGN core networks.
Add to Wishlist
Free
tdta
This training provides an in-depth knowledge of telecom security problems and their roots in the telecom systems
Add to Wishlist
Free
tdta
Using Firewall to build the defense
Add to Wishlist
Free
tdta
Telecom Security Overview – Deep Dive
Add to Wishlist
Free
tdta
Mobile Wireless Telecommunication 4G VoLTE
Add to Wishlist
Free
tdta
TS 101 TELECOM SECURITY Mobile Wireless Telecommunication 2G & 3G
Add to Wishlist
Free
Add to Wishlist
Enrolled:
6 students
Popular Courses
Archive
Working hours
Monday | 9:30 am - 6.00 pm |
Tuesday | 9:30 am - 6.00 pm |
Wednesday | 9:30 am - 6.00 pm |
Thursday | 9:30 am - 6.00 pm |
Friday | Closed |
Saturday | Closed |
Sunday | 9:30 am - 5.00 pm |
TS-270 LTE SECURITY AND INSECURITY
Category:
Price:
Free