• Classroom
  • Online, Instructor-Led
Course Description

5G Cybersecurity for Policymakers Training Workshop is a 2-day training workshop on 5G cybersecurity and Cyber threats for policymakers and non-technical professionals and officers. 5G will have a tremendous economic impact on global economy and expected to enable $13.2 trillion in economic output by 2035 according to Qualcomm.

The 5G cybersecurity workshop discusses analysis and development of 5G policies and standards to serve as the foundation for securing 5G services and infrastructure. Participants will learn how to facilitate secure deployment and commercialization of 5G technologies to prevent attempts by threat actors to influence the design, architecture and implementation of 5G networks.

Learning Objectives

  • Learn the fundamental concepts of 5G network
  • List and discuss various 5G use cases
  • Discuss end-to-end 5G network architecture, vulnerabilities and security issues
  • Describe 5G NR, 5GC: 5G core functions, architecture, AMF, Network Slicing, NG-RAN, SBA, SMF, UPF, SDN/VFN, Network Slicing, MEC, LTE-M, 5G/NB-IoT
  • Identify 5G operational scenarios, D2D, and signaling
  • Discuss security architecture and procedures for 5G systems
  • Explain 5G security issues, attacks and mitigation
  • Describe 5G cybersecurity frameworks that provide a strategic view of 5G cybersecurity risk management, both quantitative and qualitative
  • Develop the vocabulary of 5G and 5G cybersecurity to support policy discussions and analysis
  • Identify the leading approaches to managing 5G cybersecurity, including 'defense in depth' and the National Institute of Standards and Technology (NIST) Cybersecurity Framework, National Cybersecurity Center of Excellence (NCCoE)  5G Cybersecurity: Preparing a Secure Evolution and ENISA's (European Union Agency for Cybersecurity) threat landscape for 5G Networks
  • Generate a practical interpretation of the tradeoffs between security and privacy, and a method for understanding policies and priorities
  • Learn how decisions made by technologists may affect the policy landscape
  • Framework Connections

    The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

    Specialty Areas

    • All-Source Analysis
    • Cyber Defense Analysis
    • Risk Management
    • Cybersecurity Management
    • Knowledge Management