5G Trust Model - Recommendations and Best Practices for CSPs
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
RSAConference 2020
The Real Value of SG
SG is a transformation journey-preparations needs to start today From 4G Security to 5G Security through combination of technologies
SG use cases & services have demanding, diverse and dynamic requirements
Security landscape is changing
Architecture view: SG security operations requirements for CSP
From LTE to SG: Adopting New Networking Paradigms
3GPP standard Security Architecture 4G vs SG, a brief comparison 4G (LTE) Security
Key Cloud Security Risks Security Challenges
Cloud Infrastructure threat landscape
IoT eco system and threats at different levels
Changing landscape...
Regulatory requirements across the Globe Countries must consider 5G specific regulations as an extension of Cybersecurity guidelines
Design for Security
How should CSPs address each security domain
Four key 5G security operations capabilities to help CSPs build digital trust
Best practices. Use of next generation technologies in SG Security
Network Slicing Security & Network Slice Isolation
A few case studies Creating foundation for comprehensive 5G Security measures
In summary. Key recommendations
Apply the learnings from this session Points to ponder....
Taught by
RSA Conference
Related Courses
AZ-500 Microsoft Azure Security TechnologiesA Cloud Guru Certified Information Systems Security Professional (CISSP)
A Cloud Guru CompTIA CASP+ Certification, CAS-003 Exam Preparation
A Cloud Guru Automated Cyber Security Incident Response
EDUCBA via Coursera AWS IoT Security Series (Traditional Chinese)
Amazon Web Services via AWS Skill Builder