5G Core Network (5GC) including MEC and 5G Cybersecurity
About This Course
At the end of this course, the participants will understand:
• 5G core and its key technologies
• What is Cloud-native? Why have control and user plane separation?
• Network virtualisation and network slicing
• Network Function Virtualisation and Software Defined Networking in 5G core
• Microservices orchestration and management
• How OSS and BSS systems manage the core network and its services for provisioning and charging
• Drivers of MEC
• Components of MEC
• How MEC is managed and charged
• Real world applications of MEC
• 5G security framework and architecture
• 5G security assurance and evaluation scheme
• 5G threat actors, threats and mitigations
What You'll Learn
5G also makes extensive use of Network Function Virtualisation (NFV) and Software-defined Networking (SDN).
In this training course, we will navigate through all these changes, the functions and the reasons they have evolved to this from 4G.
We will also discuss how management and provisioning are done on an end-to-end basis and how the charging of services will change with the new enterprise use cases needing higher reliability, scalability, guaranteed bandwidth and low latency and data roaming across networks.
As Multi-access Edge Computing (MEC) is a key feature of 5G enabling low latency computing, we will discuss how MEC features in 5GC, its uses, management, benefits and challenges. Some important examples such as Cellular-Vehicle-to-Anything (C-V2X), drone control and media processing will be used to illustrate the architecture and its use 1682.
Finally, an open network like 5G will be susceptible to more attacks by different threat actors 464 than before. We will discuss the threat actors, threats and mitigations 464 from physical to cyber level for both the telecom operator and the enterprises using 5G.
Entry Requirements
Participants need to have fundamental knowledge of 5G technology