You have any questions?
With the emergence of 5G-NR NSA (Non-StandAlone) and the future deployment of SA (Standalone) mode, not only cellphones but also cars and infrastructures as many other objects will be actively connected to the internet. Moreover, using NR-U (New Radio Unlicensed) bands with 5G allows private companies, campuses, and other places to own their own 5G network. All of these changes introduce new risks that will see during this training.
Indeed, this course aims to focus on 5G NSA (Non-Standalone), and SA (Standalone) security, giving the techniques to perform security assessments on devices as well as on the current and Next Generation Core Network.
Get also ready with upcoming OpenRAN networks representing new commercial opportunities, but also introducing new vectors for potential attackers.
With this class, students will learn how to hunt for vulnerability in 5G mobile radio communications and current + Next-Generation Core Networks:
Day 1 will introduce the 5G NSA mode and the SA mode, which should appear in many countries in the fall of 2022. During this day, we will also introduce the radio aspect, the tools, and the setup to organize our RF assessments with Software-Defined Radio
The last day will be an opportunity to see the core network side, which could be very interesting when the operator exposes some nodes outside, as was the case many times. Moreover, it will focus more on the Standalone mode, which will drastically change from 2G-4G infrastructures and applications.
During this day, attendees will also realize why it is crucial to not only rely on the 5G-NR security mechanisms but also provide additional countermeasures in devices.
OpenRAN represents a good opportunities for manufacturers that are not part of the telecom ecosystem. This technology revisits all the architectures of a RAN with open-sources blocks and new AI concepts to handle and scale a network. But this new technology that is sold to be secure using open-sources blocks can also introduce new vulnerabilities and vectors of attacks.
In this section, we will learn about OpenRAN, and how to attack and secure such a network.
Content of private trainings can be arranged depending on your needs. We also provide additional content as follows:
Security researcher at Trend Micro, Sébastien is also the founder of the PentHertz consulting company, which specializes in wireless and hardware security.
If you need to send us a mail regarding the course, please write to us at [email protected] for more information.
3-day remote live training, including a RF kits (bladeRF 2.0 mini), slides, a Virtual Machine, scripts/tools and captures. The content can be customized depending on the means and required days for the training.
An extra discount can be negotiated depending on the number of attendees.
The content can be fully tailored depending on your needs.
New content, events, products, services, and more!