5G Core Network (5GC) including MEC and 5G Cybersecurity (Synchronous e-learning)

Training Provider: NATIONAL UNIVERSITY OF SINGAPORE
Course Reference: TGS-2022013677
S$570
Original: S$1,900
Save S$1,330

About This Course

At the end of this course, the participants will understand:
• 5G core and its key technologies
• What is Cloud-native? Why have control and user plane separation?
• Network virtualisation and network slicing
• Network Function Virtualisation and Software Defined Networking in 5G core
• Microservices orchestration and management
• How OSS and BSS systems manage the core network and its services for provisioning and charging
• Drivers of MEC
• Components of MEC
• How MEC is managed and charged
• Real world applications of MEC
• 5G security framework and architecture
• 5G security assurance and evaluation scheme
• 5G threat actors, threats and mitigations

What You'll Learn

The 5G core network (5GC) is a radical departure from 4G and earlier. This is because the applications of 5G are much wider in scope, especially with Enterprises expected to be big users of 5G. 5GC makes scaling easier by being fully Cloud-native 333 and with Control plane-User plan separation. There are also external Application Programmable interfaces (APIs) created for enterprise integration.
5G also makes extensive use of Network Function Virtualisation (NFV) and Software-defined Networking (SDN).
In this training course, we will navigate through all these changes, the functions and the reasons they have evolved to this from 4G.
We will also discuss how management and provisioning are done on an end-to-end basis and how the charging of services will change with the new enterprise use cases needing higher reliability, scalability, guaranteed bandwidth and low latency and data roaming across networks.
As Multi-access Edge Computing (MEC) is a key feature of 5G enabling low latency computing, we will discuss how MEC features in 5GC, its uses, management, benefits and challenges. Some important examples such as Cellular-Vehicle-to-Anything (C-V2X), drone control and media processing will be used to illustrate the architecture and its use 1682.
Finally, an open network like 5G will be susceptible to more attacks by different threat actors 464 than before. We will discuss the threat actors, threats and mitigations 464 from physical to cyber level for both the telecom operator and the enterprises using 5G.

Entry Requirements

Participants need to have fundamental knowledge of 5G technology

Course Details

Duration 14 hours
Language English
Training Commitment Not specified
Total Enrolled New course
Back to All Courses
Note: To apply for this course, visit the SkillsFuture website or contact the training provider directly.

More Courses from NATIONAL UNIVERSITY OF SINGAPORE

Objectives: At the end of the programme, participants are expected to achieve the following objecti...
Duration 7.5 hours
Fee After Subsidy S$285
Objectives: At the end of the programme, participants are expected to achieve the following objecti...
Duration 7.5 hours
Fee After Subsidy S$475
The programme is designed to transform Chinese language educators into impactful leaders equipped to...
Duration 77 hours
Fee After Subsidy S$2,550