WORKSHOP OBJECTIVE
The Telecom Security Training course aims to equip participants with a comprehensive understanding of 5G network security, covering core network threats, RAN security, penetration testing, and advanced exploitation techniques. Through a mix of theory and hands-on training, attendees will explore 3GPP standards, O-RAN architectures, vulnerability assessments, attack surface mapping, and modern security frameworks like MITRE ATTA&CK and FiGHT. By engaging in real-world security scenarios, and exploit research in a controlled environment, participants will develop practical skills in reconnaissance, network enumeration, API security, authentication attacks, and protocol fuzzing—ultimately preparing them to identify, mitigate, and respond to security risks in telecom infrastructures.
PRE-REQUISITE
-
Basic Knowledge of IT Security
-
Beginner Level Python skills
-
Basics of Linux
PARTICIPANT'S REQUIREMENTS
-
Laptop with basic configuration (8gb ram)
-
Internet connection
-
Ubuntu 20.01 or 21.01 or Debian 10 (mandatory installed not virtual box or vmware) or latest version
WHO SHOULD ATTEND
ECE students, M.Tech Students and Phd students,Faculties.,IT Employees working in network and telecom domain
WHAT TO EXPECT
Participants who complete this workshop will gain hands-on expertise in telecom security assessment, penetration testing, and threat mitigation for 5G networks, core security, and RAN infrastructure.
WHAT NOT TO EXPECT
Becoming an expert in telecom pentesting
DURATION
Duration: 3 days (6-8) Hrs
COURSE CONTENT
-
xG of Telecom: Evolution from 2G to 5G and beyond
-
4G vs. 5G Core Differences: Key differences in architecture and security
-
5G Deployment Modes: NSA vs. SA deployment models
-
3GPP & O-RAN Specifications: Overview of industry standards and compliance.
-
xHauling in Telecom Networks: Analyzing fronthaul, midhaul, and backhaul security.
-
Threat Modelling & Risk Assessment
-
MITRE ATT&CK Framework & MITRE FiGHT Strategy: Security frameworks for telecom
-
Twin Circle Approach for Modern Telco Security: Advanced risk assessment methodologies
-
Security Architecture & Requirements
-
RAN (Radio Access Network) Security: Addressing threats in RAN infrastructure.
-
Edge Security: Protecting gNB and edge computing environments
-
Core Network Security: Strategies for securing the telecom core
-
3GPP & O-RAN Security Standard
-
Standardization & Compliance: Understanding security compliance requirements
-
3GPP & O-RAN Security Guidelines: Best practices for network security.
-
Key Working Groups: Focus on 3GPP SA3 (33.xxx series) and related standards