وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Implementing Zero Trust for 5G and Open RAN

سرفصل های دوره

Zero Trust boosts your telecom infrastructure. But how do you implement it effectively and efficiently? In this course, instructor Taha Sajid covers the essentials of Zero Trust security requirements specific to telecom networks, focusing on 5G and Open RAN infrastructure. Gain hands-on experience with tools for assessing the maturity and security readiness of telecom networks against cyberthreats. By the end of this course, you’ll be equipped with skills required to analyze common challenges encountered by telecom organizations looking to integrate Zero Trust security controls into their standards.


01 - Introduction
  • 01 - The zero trust revolution for 5G and Open RAN
  • 02 - What you should know

  • 02 - 1. Telecom Network Security Overview
  • 01 - The evolution from 1G to 5G
  • 02 - Key components of the mobile network
  • 03 - Decoding mobile network architecture
  • 04 - Security risks with confidentiality and data integrity
  • 05 - Security requirements by standards organizations
  • 06 - Security challenges and risk at present in 5G and ORAN
  • 07 - Challenge Study a recent cyber attack
  • 08 - Solution Study a recent cyber attack

  • 03 - 2. Overview of ZTA Security Solutions
  • 01 - Applicability of enterprise ZTA security solutions
  • 02 - 3GPP, ETSI zero trust security guidelines
  • 03 - ORAN Alliance security guidelines
  • 04 - Telecom security architecture
  • 05 - Areas of concern in an advanced telecom network
  • 06 - Challenge High-risk vulnerabilities
  • 07 - Solution High-risk vulnerabilities

  • 04 - 3. Zero Trust Security Architecture
  • 01 - Why use zero trust for mobile networks
  • 02 - Alignment of mobile security architecture to ZT tenets
  • 03 - 5G security domains for zero trust
  • 04 - Zero trust interfaces and reference points
  • 05 - 5G zero trust reference architecture
  • 06 - Challenge Create a security design with policy enforcements
  • 07 - Solution Create a security design with policy enforcements

  • 05 - 4. Zero Trust Policy Management and Use Cases
  • 01 - Zero trust policy management
  • 02 - User and access
  • 03 - Management and data zone
  • 04 - Network function virtualization
  • 05 - Network slice, applications, and service
  • 06 - Transport zone
  • 07 - Challenge PDP and PEP matrix
  • 08 - Solution PDP and PEP matrix

  • 06 - 5. Zero Trust Security Framework
  • 01 - Zero trust security requirements
  • 02 - Assessing maturity level
  • 03 - Recommendations
  • 04 - The roadmap to 6G
  • 05 - Challenge Threat modeling
  • 06 - Solution Threat modeling

  • 07 - 6. Conclusion
  • 01 - Next steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 45569
    حجم: 262 مگابایت
    مدت زمان: 128 دقیقه
    تاریخ انتشار: ۱۴ دی ۱۴۰۴
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید