Nigerian Seminars and Trainings

Search conferences, training, seminars, courses and workshops in Nigeria and around the world

business logo

Mobile Communications Networks Infrastructure Security Operation Course

By: HRODC Postgraduate Training Institute

United Arab Emirates

06 - 17 Feb, 2017  12 days

Follow Event   

  

GBP 10,000

Issues addressed in this mobile communications networks infrastructure security operation course include:

  • Evolution and Components of Mobile Communications
  • The First Mobile Generations (1G to 2.5G)
  • The First Operational Cellular Communication;
  • The Second (2G) Generation of the Wireless Mobile Network:

Global Systems for Mobile Communication (GSM)

  • Specification of Global Systems for Mobile Communication (GSM);
  • Architecture of GSM - Mobile Station (MS), Base Station Subsystem (BSS), Network and Switching Subsystem (NSB), Operating Subsystem (OSS);
  • Functionality of Global Systems for Mobile Communication (GSM);

Global Systems for Mobile Communication (GSM) Services

  • Frequency Division Multiple Access (FDMA);
  • Time Division Multiple Access (TDMA) Scheme;
  • Code Division Multiple Access (CDMA) Technology;
  • Dynamic Frequency and Channel Allocation (DFCA)
  • Wireless Second and Half Generation (2.5G)
  • General Packet Radio Service (GPRS); and
  • European Telecommunications Standards Institute (ETSI);
  • General Packet Radio Service (GPRS) Architecture;
  • The General Packet Radio Service (GPRS) Network Infrastructure
  • General Packet Radio Service (GPRS)/GSM Network Interfaces
  • General Packet Radio Service (GPRS) Services;
  • General Packet Radio Service (GPRS) Applications
  • Wireless Application Protocol (WAP).
  • Third Mobile Generations (3G) Networks
  • Third Generation Partnership Program (3GPP);
  • 3G Specifications;
  • 3G Wireless;
  • 3G Systems;
  • Mobile Telecommunications System (UMTS);
  • International Mobile Telecommunications-2000 (IMT-2000);
  • Wideband Code Division Multiple Access (W-CDMA);
  • Third Generation Partnership Project (3GPP) Release 99;
  • Third Generation Partnership Project (3GPP) Release 2000;
  • High Speed Downlink Packet Access (HSDPA);
  • Mobile Telecommunications System (UMTS) Architecture;
  • The Mobile Station (MS);
  • The access network (UTRAN);
  • The core network (CN).
  • Mobile Telecommunications System (UMTS) Services;
  • Enhanced Data GSM Environment (EDGE).
  • WiMAX (Worldwide Interoperability for Microwave Access) and Short Range Wireless Network
  • Orthogonal Frequency Division Multiple Access (OFDMA);
  • Worldwide Interoperability for Microwave Access (WiMAX) Architecture;
  • Wireless Local Area Networks (WLAN);
  • Wireless Personal Area Network (WPAN).
  • 4G Wireless Network
  • 3GPP-WLAN (Wireless Local Area Networks);
  • Wireless Wide Area Networks (WWANs);
  • Wireless Metropolitan Area Networks (WMANs);
  • Non-roaming Wireless Local Area Networks (WLAN) interworking Reference Mode;
  • A cooperative 4G Wireless Architecture;
  • 4G Framework and Integration of all Mobile Technologies:
  • Global System for Mobile Communications (GSM);
  • General Packet Radio Service (GPRS);
  • International Mobile Communications (IMT-2000);
  • Wireless Fidelity (Wi-Fi);
  • Bluetooth.
  • 3GPP Mobile Communications: Long Term Evolution (LTE) or System Architecture Evolution (SAE)
  • Long Term Evolution (LTE) or System Architecture Evolution (SAE) Architecture;
  • Evolved Universal Terrestrial Radio Access Network (E-UTRAN);
  • Protocol Stacks;
  • Long Term Evolution (LTE) Radio Network;
  • Long Term Evolution (LTE) Spectrum;
  • Single Carrier – Frequency Division Multiplexing (SC-FDM) and Single Carrier – Frequency Division Multiple Access (SC-FDMA);
  • Frame Structure and Physical Channels;
  • Physical Layer Procedures;
  • Long Term Evolution (LTE) Radio Resource Management;
  • Uplink RRM;
  • Downlink RRM;
  • Intra-LTE Handover;
  • Long Term Evolution (LTE) Release 8/9 Features;
  • Long Term Evolution (LTE) Advanced Features;
  • Long Term Evolution (LTE) Transport and Core Network;
  • Transport Network;
  • Core Network.
  • Security and Protection of Mobile Communications
  • Security from GPRS Towards 3G Mobile Telephone Network Data Services (1)
  • General Packet Radio System - GPRS Overview;
  • Global System for Mobile Communications (GSM) and General Packet Radio Service (GPRS) Security;
  • Protected Information on a Global System for Mobile Communications (GSM)/ General Packet Radio Service (GPRS) Network:
  • User Data;
  • Charging Information;
  • Subscriber Information;
  • Technical Information of the GSM/GPRS/Network.
  • Standard Global System for Mobile Communications (GSM) and General Packet Radio Service (GPRS) Security Services:
  • Anonymity;
  • Authentication;
  • Signaling Protection/User Data Protection.
  • Security from GPRS Towards 3G Mobile Telephone Network Data Services (2)
  • Network Interface Security:
  • User Interface;
  • Air link Interface;
  • Internal Interfaces (BTS and SGSN; SGSN and HLR; SGSN and GGSN);
  • Intercarrier Interface;
  • External Interfaces.
  • External GPRS Network:
  • Managed Internet Connection;
  • Standard Internet Connection;
  • Frame Relay Connection.
  • Security Threats:
  • Attacks on the Mobile Device;
  • Attacks on the Radio Path;
  • Attacks on the Cellular Network;
  • Attacks on the General Packet Radio Service (GPRS), Public and Corporate Network.
  • Security and Service Provision Models for 4G Wireless Networks
  • Typical cooperative 4G applications:
  • Mobile payment;
  • Mobile target tracking;
  • Vehicular networks.
  • Attacks against wireless networks:
  • Security requirements and challenges;
  • Security requirements;
  • Security challenges.
  • Service Provision in 4G wireless networks:
  • 4G service architectures;
  • Peer-to-Peer computing;
  • Grid computing;
  • Cloud computing.
  • Mobile Grid: concept, challenges, and ongoing research:
  • Mobile Grid concept;
  • Mobile Grid challenges;
  • Ongoing research of mobile Grid.
  • Advanced Authentication Model for 4G Wireless Networks
  • Security management in 4G wireless networks;
  • Requirements for e-government Public Key Infrastructure (PKI);
  • Management of multi-trust in e-government:
  • Multi-trust certicate structure;
  • Hierarchical Lightweight Directory Access Protocol (LDAP);
  • Trust Level Verification.
  • Public Key Infrastructure (PKI) Organization:
  • Public Key Infrastructure (PKI) Registration;
  • Public Key Infrastructure (PKI) Generation;
  • Public Key Infrastructure (PKI) Revocation;
  • Public Key Infrastructure (PKI) Verification;
  • Public Key Infrastructure (PKI) Publication.
  • Strategy of analysis:
  • Multi-level Trust based Authentication Model;
  • Multi-level Trust Establishment;
  • Extended Trust-based Authentication Model;
  • Advanced Identity Management Model;
  • Securing 4G subscribers identities;
  • 4G Identity management model;
  • Inter-system Authentication Model;
  • Model Validation.
  • Long Term Evolution (LTE) Security Architecture
  • Long Term Evolution (LTE) Network;
  • Long Term Evolution (LTE) Communications Planes;
  • Long Term Evolution (LTE) Protocols:
  • Radio Resource Control (RRC);
  • Packet Data Convergence Protocol (PDCP);
  • Radio Link Control (RLC);
  • Medium Access Control (MAC).
  • Subscriber Identity (IMSI);
  • Universal Integrated Circuit Card (UICC) Token;
  • Device and Network Authentication;
  • AKA Packet Capture:
  • Sending Temporary Identity;
  • Authentication Vectors;
  • Authentication Response.
  • Cryptographic Key Usage;
  • Air Interface Protection;
  • Backhaul Protection.
  • Threats to Long Term Evolution (LTE) Networks
  • General Computer Security Threats;
  • Renegotiation Attacks Threat and Mitigation;
  • Device and Identity Tracking Threat and Mitigation;
  • Call Interception Threat and Mitigation;
  • Jamming UE Radio Interface Threat and Mitigation;
  • Attacks Against the Secret Key (K) Threat and Mitigation;
  • Physical Base Station Attacks Threat and Mitigation;
  • Availability Attacks on eNodeB and Core Threat and Mitigation
Dubai, UAE Feb 06 - 17 Feb, 2017
GBP 10,000.00
(Convert Currency)

+44 7736147507; +44 1902 763607; +44 2071935906; +

Related Courses
Petroleum - Oil and Gas - Production Contracts Course Petroleum - Oil and Gas - Production Contracts Course

26 days, 03 - 28 Apr, 2017 

2017-04-03 12:04:00
Indonesia

HRODC Postgraduate Training Institute

This petroleum oil and gas production contracts course is designed for: Refinery Process Engineers Petroleum Engineers Process Engineers (Oil and Gas Industry) Geologist Reservoir Engineers Field ...

Professional Business Administration: Business Administration Management for Professional Business Administrators Course (Malaysia) Professional Business Administration: Business Administration Management for Professional Business Administrators Course (Malaysia)
On going

26 days, 06 - 31 Mar, 2017 

2017-03-06 12:03:00
Malaysia

HRODC Postgraduate Training Institute

This professional business administration: business administration management for professional business administrator’s course (MALAYSIA) course is designed for: Executives; Board of ...

CCTV System Design, Camera, Television, Video Processing, Transmission Media and Networking CCTV System Design, Camera, Television, Video Processing, Transmission Media and Networking

26 days, 03 - 28 Apr, 2017 

2017-04-03 12:04:00
Philippines

HRODC Postgraduate Training Institute

The CCTV System Design, Camera, Television, Video Processing, Transmission Media and Networking training course covers the following: Part 1: The Closed-Circuit Television (CCTV) Industry Role of ...

Business and Organisational Analysis Course - Diploma Postgraduate (London, UK) Business and Organisational Analysis Course - Diploma Postgraduate (London, UK)

6 days, 24 - 29 Apr, 2017 

2017-04-24 12:04:00
United Kingdom

HRODC Postgraduate Training Institute

By the conclusion of the specified learning and development activities, delegates will be able to: Define, describe and analyse the nature of an organisation; Distinguish between formal and ...