5G and Cyber Security: First Look
Offered By: Pluralsight
Course Description
Overview
This course provides you with a first look of how 5G may impact your cybersecurity and the areas where you may need to consider new potential risks for your organization and enterprise.
5G is a revolutionary technology that could enable state of the art applications, but with beauty comes the beast that is the security challenges. In this course, 5G and Cyber Security: First Look, you’ll gain a solid understanding about the 5G principles and possible security threats that it can come with. First, you’ll explore 5G and its use cases. Next, you’ll discover the technical aspects of 5G and how it’s different from its older generations. Finally, you’ll learn how to incorporate efficient security mechanisms to prevent the breaches. When you’re finished with this course, you’ll have the knowledge of 5G and cybersecurity needed to deploy its applications on site.
5G is a revolutionary technology that could enable state of the art applications, but with beauty comes the beast that is the security challenges. In this course, 5G and Cyber Security: First Look, you’ll gain a solid understanding about the 5G principles and possible security threats that it can come with. First, you’ll explore 5G and its use cases. Next, you’ll discover the technical aspects of 5G and how it’s different from its older generations. Finally, you’ll learn how to incorporate efficient security mechanisms to prevent the breaches. When you’re finished with this course, you’ll have the knowledge of 5G and cybersecurity needed to deploy its applications on site.
Syllabus
- Course Overview 1min
- Understanding 5G and Its Architecture 18mins
- Implementing Network Slicing and Virtualization 12mins
- Analyzing 5G Security 8mins
- Interworking between 5G and the Previous Generation Network 14mins
- Decoding Cyber Security and Its protocols 19mins
Taught by
Niraj Joshi
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network