GSM and GPRS Security Training - PowerPoint PPT Presentation

About This Presentation
Title:

GSM and GPRS Security Training

Description:

The objective of this course is to give the member a solid and instinctive comprehension of what security in the remote frameworks is and how the security capacities are actualized in the GSM/GPRS/UMTS radio and center network. Learn More About GSM and GPRS Security Training – PowerPoint PPT presentation

Number of Views:85
Slides: 27
Provided by: wesley.comal
Tags:

less

Transcript and Presenter's Notes

Title: GSM and GPRS Security Training


1
Cyber Security Training Seminars
GSM GPRS Security Training
Call Us Today 1-972-665-9786 https//www.tonex.c
om/training-courses/gsm-gprs-security/
TAKE THIS COURSE
Since 1993, Tonex has specialized in providing
industry-leading training, courses, seminars,
workshops, and consulting services. Fortune 500
companies certified.
2
(No Transcript)
3
  • Audience
  •  Course designed for
  • Network security wireless specialists
  • Operators and manufacturers
  • Wireless network researcher
  • Academics
  • Security engineers
  • Researchers and consultants
  • Price 1,699.00 Course Number 6031 Length 2
    Days

GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
TAKE THIS COURSE
4
Having finished this course the member will have
the capacity to see how security is executed,
conveyed and overseen in GSM, GPRS and UMTS
networks, comprehend security ideas, comprehend
the advantages of new security strategies
connected and how they are actualized. The
objective of this course is to give the member a
solid and instinctive comprehension of what
security in the remote frameworks is and how the
security capacities are actualized in the
GSM/GPRS/UMTS radio and center network. The
course concentrates both reporting in real time
interface and the center network.
GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
TAKE THIS COURSE
5
TONEX TRAINING GSM and GPRS Security 2 Days
Course Call Us Today 1-972-665-9786
TAKE THIS COURSE
GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
6
Having finished this course the member will have
the capacity to see how security is executed,
conveyed and overseen in GSM, GPRS and UMTS
networks, comprehend security ideas, comprehend
the advantages of new security strategies
connected and how they are actualized. The
objective of this course is to give the member a
solid and instinctive comprehension of what
security in the remote frameworks is and how the
security capacities are actualized in the
GSM/GPRS/UMTS radio and center network. The
course concentrates both reporting in real time
interface and the center network.
GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
TAKE THIS COURSE
7
TONEX TRAINING GSM and GPRS Security 2 Days
Course Call Us Today 1-972-665-9786
TAKE THIS COURSE
GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
8
  • Who Should Attend ?
  • Anyone needing in-depth knowledge of the security
    in the GSM family of wireless networks.
  • The course is essential for
  • Network security wireless specialists
  • Operators and manufacturers
  • Wireless network researcher
  • Academics
  • Security engineers
  • Researchers and consultants

GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
TAKE THIS COURSE
9
TONEX TRAINING GSM and GPRS Security 2 Days
Course Call Us Today 1-972-665-9786
TAKE THIS COURSE
GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
10
Objectives The goal of this course is to give
the participant a strong and intuitive
understanding of what security in the wireless
systems is and how the security functions are
implemented in the GSM/GPRS/UMTS radio and core
network. The course focuses both on the air
interface and the core network.
GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
TAKE THIS COURSE
11
  • Course outline
  • Security Overview
  • Overview of Wireless Security Requirements
  • GSM Security Review
  • GPRS Security Review
  • UMTS Security Review
  • UMTS Authentication and Key Management
  • LTE Security Review

GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
TAKE THIS COURSE
12
TONEX TRAINING GSM and GPRS Security 2 Days
Course Call Us Today 1-972-665-9786
TAKE THIS COURSE
GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
13
  • Security Overview
  • Basic security concepts
  • Authentication
  • Privacy
  • Integrity
  • Authorization
  • Non-repudiation
  • Encryption
  • Encryption Technologies
  • Cryptography Keys
  • Symmetric and Asymmetric
  • Ciphers
  • Cipher Suites
  • Certificates

GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
TAKE THIS COURSE
14
  • Overview of Wireless Security Requirements
  • Wireless security needs
  • Basic GSM, GPRS and UMTS security functions
  • GSM Security Review
  • GSM security algorithms
  • GSM authentication and authorization procedures
  • A3, A8 and A5
  • GSM ciphering procedures
  • Security threats to GSM

GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
TAKE THIS COURSE
15
TONEX TRAINING GSM and GPRS Security 2 Days
Course Call Us Today 1-972-665-9786
TAKE THIS COURSE
GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
16
  • GPRS Security Review
  • GPRS security algorithms
  • GSM authentication and authorization procedures
  • GPRS ciphering procedures
  • Kasumi, GEA1, GEA2 and GEA3
  • Security threats to GPRS
  • UMTS Security Review
  • Security in UTRAN
  • Security in the UMTS Core Network
  • UMTS security algorithms
  • UMTS authentication and authorization procedures
  • UMTS ciphering procedures
  • Security threats to UMTS
  • Lawful Intercept overview
  • Mobile Application Part Security
  • MAPsec overview

GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
TAKE THIS COURSE
17
  • UMTS Authentication and Key Management
  • AKA Algorithms
  • Normal AKA procedure
  • AKA procedure in the AuC
  • AKA procedure in the USIM
  • AKA procedure in the VLR/SGSN
  • Integrity function f9, Confidentiality function
    f8
  • Milenage and KASUMI algorithms

GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
TAKE THIS COURSE
18
TONEX TRAINING GSM and GPRS Security 2 Days
Course Call Us Today 1-972-665-9786
TAKE THIS COURSE
GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
19
  • LTE Security Review
  • Security in E-UTRAN
  • Security in SAE/EPC/EPS
  • LTE security algorithms
  • LTE authentication and authorization procedures
  • LTE ciphering procedures
  • Security threats to LTE

GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
TAKE THIS COURSE
20
Feedback from Students attending this course
Thanks for the personalized training, I
learned a lot. The diagrams really helped. Gary
Nakata, US Army, NGIC EXCELLENT course! The
instructor was great in checking with us for
expectations and needs, and addressed them in a
very knowledgeable and professional manner. the
documentation provided is EXCELLENT!! Anita
Davey, Juniper Networks Excellent course,
excellent instructor! Adrean Liu, Juniper
Networks Excellent course! Chris Marks,
Juniper Networks
GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
TAKE THIS COURSE
21
TONEX TRAINING GSM and GPRS Security 2 Days
Course Call Us Today 1-972-665-9786
TAKE THIS COURSE
GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
22
TONEX TRAINING GSM and GPRS Security 2 Days
Course Call Us Today 1-972-665-9786
TAKE THIS COURSE
GSM and GPRS Security https//www.tonex.com/traini
ng-courses/gsm-gprs-security/
23
GSM and GPRS Security
https//www.tonex.com/training-courses/gsm-gprs-se
curity/
TAKE THIS COURSE
24
Cybersecurity Training Seminars
Cybersecurity used to be thought of as a
specialized, niche occupation. But with the
advance of cybercrimes over the past few years,
just about everyone with access to a laptop,
desktop or mobile device has had to do something
to protect their electronic data. Cybersecurity
Foundation Iot Security Risk Management Framework
Training Wireless Security Training https//www.t
onex.com/cybersecurity-training-seminars/
25
(No Transcript)
26
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com