
Cyber 5G Series - Kubernetes Security
COURSE SYNOPSIS:
In the era of 5G, telco networks are rapidly evolving into highly virtualized and software-defined environments. Kubernetes has become the de facto standard for orchestrating containerized network functions (CNFs), enabling scalability, automation, and rapid deployment of 5G services. However, this shift introduces new cybersecurity challenges, including cluster security, CNF isolation, network segmentation, and secure configuration management.
This training equips telco engineers, DevOps, and cybersecurity professionals with the knowledge and skills to securely deploy, manage, and monitor Kubernetes clusters for 5G networks. Participants will learn not only the fundamentals of Kubernetes and containerization but also the administration, monitoring, and security practices critical for resilient and compliant 5G operations.
Why These Skills Matter?
Protecting Mission-Critical 5G Infrastructure: CNFs carry essential network functions such as UPF, AMF, and SMF. A misconfigured Kubernetes cluster can create vulnerabilities, leading to service outages or unauthorized access.
-
Ensuring Network Resilience and Availability: Kubernetes skills enable operators to manage pods, nodes, and clusters efficiently. This ensures high availability, rapid recovery, and continuity of 5G services even under attack or failure conditions.
-
Securing Containerized Workloads: Containers can be ephemeral and distributed, increasing the attack surface. Knowledge of RBAC, network policies, secrets management, and service mesh security is essential to safeguard CNFs.
-
Compliance and Audit Readiness: Telco networks are subject to strict regulatory and cybersecurity standards. Kubernetes administration and monitoring skills ensure configurations are auditable, compliant, and defensible.
Entry requirements
-
At least 3 years of cyber security experience
-
Min. 1 year of work experience in telecommunication
-
Been through T1-1 and T1-2 course in CyberXCenter, knowing the basic fundamentals of Telecommunication network
These skills empower telecom professionals to build, operate, and secure next-generation 5G networks, balancing innovation, performance, and cybersecurity. Without them, networks are vulnerable to service disruptions, cyberattacks, and regulatory penalties.
COURSE DURATION:
-
3 days of Instructor-led training
EXPECTATION AFTER THE TRAINING:
​
-
Securely Deploy and Manage Kubernetes Clusters: Confidently set up, configure, and administer Kubernetes clusters tailored for 5G CNFs and implement RBAC, secrets management, and network policies to reduce attack surfaces.
-
Operate and Monitor 5G CNFs Effectively: Deploy containerized network functions (CNFs) with proper scaling, high availability, and fault tolerance and use monitoring and logging tools (Prometheus, Grafana, ELK) to detect performance issues or security anomalies.
-
Automate and Streamline Operations with Security: Integrate CI/CD pipelines and GitOps practices for safe, automated deployment of CNFs and perform updates, rollbacks, and patching without compromising cluster security.
-
Troubleshoot and Respond to Security Incidents : Identify and resolve pod, node, and network issues quickly and apply best practices for incident detection and mitigation in Kubernetes-based 5G networks.
WHAT WILL BE COVERED IN THE COURSE:
1. Understand Kubernetes fundamentals and architecture.
-
Overview of Kubernetes architecture
-
Master node, worker nodes
-
Pods, ReplicaSets, Deployments, Services
-
Kubernetes networking and storage
-
Why Kubernetes for 5G
-
Scalability for CNFs
-
-
Automation for network slicing and service deploymentDeploy and manage containerized network functions (CNFs) on Kubernetes.
-
Integrate Kubernetes with 5G network infrastructure.
-
Apply CI/CD and automation for telco workloads.
-
Monitor and troubleshoot Kubernetes-based 5G services.
2. Containers and CNFs
-
Docker vs containerd, container orchestration
-
Concept of Containerized Network Functions (CNFs)
-
Differences between VNFs and CNFs
-
Kubernetes-native CNF lifecycle management
-
Hands-on lab:
-
Containerize a simple network function
-
Deploy it on Kubernetes
-
Scale pods up/down
-
3. Kubernetes Networking for 5G
-
Pod networking and Services
-
Ingress controllers, egress
-
Network policies
-
Service Mesh (Istio/Linkerd) for microservices
-
5G-specific integration: UPF, AMF, SMF
-
Hands-on lab:
-
Configure network policies for CNFs
-
Deploy service mesh for communication
-
4. Kubernetes Administration
-
Cluster setup and node management
-
Role-Based Access Control (RBAC) for telco teams
-
Resource management: CPU, memory, quotas, limits
-
ConfigMaps and Secrets management
-
Upgrades and patching clusters
-
Troubleshooting:
-
Node failures
-
Pod scheduling issues
-
Network problems
-
-
Hands-on lab:
-
Add/remove nodes from cluster
-
Apply RBAC roles for different CNFs
-
Inspect and fix failing pods
-
-
Manage ConfigMaps and Secrets for CNFs
-
2-1 5G Protocol Analysis
-
2-2 5G IMS and Call Protocol Analysis
-
2-3 5G Kubernetes Security
-
2-4 5G Threat Hunting
WHO SHOULD ATTEND:
​
This course is designed for professionals who need to understand 5G Core architecture from a cybersecurity and risk perspective
​
-
Cybersecurity Professionals
-
Critical Infrastructure & Telco Security Teams
-
IT, OT, and Cloud Security Practitioners
-
Risk, Governance, and Compliance Professionals
-
Technical Leaders and Architects
-
Technical specialists and operators
.png)