5G Trust Model - Recommendations and Best Practices for CSPs
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
RSAConference 2020
The Real Value of SG
SG is a transformation journey-preparations needs to start today From 4G Security to 5G Security through combination of technologies
SG use cases & services have demanding, diverse and dynamic requirements
Security landscape is changing
Architecture view: SG security operations requirements for CSP
From LTE to SG: Adopting New Networking Paradigms
3GPP standard Security Architecture 4G vs SG, a brief comparison 4G (LTE) Security
Key Cloud Security Risks Security Challenges
Cloud Infrastructure threat landscape
IoT eco system and threats at different levels
Changing landscape...
Regulatory requirements across the Globe Countries must consider 5G specific regulations as an extension of Cybersecurity guidelines
Design for Security
How should CSPs address each security domain
Four key 5G security operations capabilities to help CSPs build digital trust
Best practices. Use of next generation technologies in SG Security
Network Slicing Security & Network Slice Isolation
A few case studies Creating foundation for comprehensive 5G Security measures
In summary. Key recommendations
Apply the learnings from this session Points to ponder....
Taught by
RSA Conference
Related Courses
Introduction aux réseaux mobilesInstitut Mines-Télécom via France Université Numerique Evolution Of Air Interface Towards 5G
Indian Institute of Technology, Kharagpur via Swayam LDPC and Polar Codes in 5G Standard
Indian Institute of Technology Madras via Swayam Business Considerations for 5G with Edge, IoT, and AI
Linux Foundation via edX Open Source and the 5G Transition
Linux Foundation via edX