Course Program

Cybersecurity on 5G

The program is aimed at public administrations and companies, public and private, who want to invest in the training of technicians and managers on the fundamental issues of security of 5G infrastructures and related applications. The program offers a number of modules. These modules can be combined to offer courses tailored to the specific needs of a given audience. 

Format: catalog of a set of about 1/2/3 day modules, divided into:

  • “background” or pre-requisite modules
  • main track
  • complementary modules

(a day lesson is 7 hours: example: 9AM-1PM + 2PM-5PM)

The courses can be accompanied by "certifications". To take the certifications you must pass tests and demonstrate certain requirements (years of experience, specific skills already possessed).


Background modules track (B1-B6)

B1 – Cryptography and network security basics (3 gg)

B1.1: Cryptography basics (1 d) B1.2: Practical network security and cryptography (2 dd)
B1.1 Confidentiality, Integrity and Availability requirement. Elementary cryptography. Data Integrity, hash functions. Asymmetric cryptography, PKI.   B1.2 Network cyberattacks, PKI tools, Network Security Protocols and Applications,  Network Perimeter Security
B2 – System security and penetration testing basics (3 dd)

Ethical hacking / security attacks / vulnerability assessment
B3 – Introduction to cellular networks (1 d)  Basic principles of Cellular Networks. Mobility Management. Authentication and Security. Cellulare networks generations: 2G/3G/4G
B4 – 5G Networks: Architecture and protocols (2 dd)  5G use cases and standardization. Architecture. RAN. Core Network. Slicing and Edge Computing.
B5 – IP networking basics / IPv6 / Software Defined Networks / NFV (1 d)  IPv4 and IPv6 Networking. The evolution of networking: SDN, NFV.
B6 – Virtualization and cloud architectures
(1 d)
Virtualization basics. Virtual Machines, Containers. Cloud architectures. Openstack. Kubernetes.

Main Track (M1 – M7)

M1 – 5G security overall vision (2 dd)    Security architecture and protocols, Authentication and user management, 5G location and domain-specific security.
M2 – 5G vulnerabilities laboratory (2 dd)    4G/5G Air Interface privacy, availability and integrity vulnerabilities and attacks
M3 – 5G Infrastructure Security (3 dd)    5G System-wide Security, NFV security, Cloud and MEC security,  Mobile Virtual Network Operators Security
M4 – 5G Device and User Security (1 dd)    5G User security Hacking 5G UE, USIM App IoT Security  
M5 – Governance, risk management, compliance (GRC) (3 dd)    Security standards Security management, security governance  
M6 – 5G products and vendors (Laboratories) (4 dd)   5G Core equipment 5G RAN equipment Open Source Solutions

M7 – 5G Offensive Security (1-2 dd)  Attack Surface, Vettori e scenari di attacco Threat Modelling Penetration Testing & Adversary Emulation  

Complementary modules track (C1-C4)

C1 – Sicurezza nelle reti WLAN (1 d)    802.1x User authentication. Protocols: EAP, Radius, AAA. Wi-Fi authentication mechanisms.
C2 – Hardware security (1 d)

Introduction and background notions, Hardware Trust Issues, Hardware Vulnerability Issues, Countermeasures, Hardware security primitives
C3 – Security “communication” / Crisis management (1 d) 
C4 – ISO 27001 Lead Auditor Certification (5 dd)