
Cyber 5G Series - IMS and Call Protocol Analysis
COURSE SYNOPSIS:
This course provides Telco professionals and network engineers with a practical, hands-on understanding of Protocol Data Units (PDUs) and their critical role in network communications. Participants will learn how PDUs operate across different network layers, how to analyze their structure and flows, and how to detect and mitigate security risks that can compromise Telco services.
The training covers three main areas:
-
PDU Fundamentals – Learn the anatomy of PDUs at each network layer and how they carry signaling and media traffic in Telco networks.
-
Standard PDU Flows – Understand typical transmission scenarios for voice, data, and signaling, and learn to identify normal versus abnormal flows.
-
Non-Standard & Advanced PDU Flows – Examine complex scenarios such as forwarded traffic, handovers, and QoS-sensitive PDUs, with a focus on security implications..
​Why These Skills Matter?
PDUs are the fundamental units of data that drive all Telco communications, from signaling to media transmission. Mismanaged or manipulated PDUs can lead to service disruptions, security breaches, and revenue loss.
Mastering PDU analysis and security enables professionals to detect anomalies, prevent attacks, and ensure reliable, secure network operations, especially in complex 5G, LTE, and cloud-based Telco environments.
Entry requirements
-
At least 3 years of cyber security experience
-
Min. 1 year of work experience in telecommunication
-
Been through T1-1 and T1-2 course in CyberXCenter, knowing the basic fundamentals of Telecommunication network
By mastering PDU analysis and security, you become the guardian of Telco communications—protecting networks, ensuring uninterrupted services, and safeguarding the trust of millions of users. Your skills turn invisible data into reliable, secure, and resilient connections that power modern life.
​
COURSE DURATION:
-
3 days of Instructor-led training
EXPECTATION AFTER THE TRAINING:
​
After completing this course, participants will be able to:
-
Understand and Analyze SIP Protocols: Comprehend SIP architecture, message types, and call flows, including standard and non-standard scenarios.
-
Identify and Mitigate Security Threats: Detect vulnerabilities such as registration hijacking, toll fraud, and call spoofing, and implement effective mitigation strategies.
-
Secure Telco SIP Deployments: Apply best practices for authentication, encryption, firewall/SBC configurations, and secure call handling.
-
Monitor and Respond to SIP Events: Use tools to capture and analyze SIP traffic, detect anomalies, and respond to incidents effectively.
-
Apply Knowledge to Real-World Scenarios: Confidently manage SIP-enabled networks in 5G, cloud, or enterprise environments while minimizing operational and security risks.
WHAT WILL BE COVERED IN THE COURSE:
1. PDU Fundamentals
-
Objectives: Understand the anatomy of PDUs and how they carry data across networks.
-
PDU structure at different layers:
-
Layer 2: Ethernet frames
-
Layer 3: IP packets
-
Layer 4: TCP/UDP segments
-
Layer 5–7: Application PDUs (SIP, RTP, Diameter, GTP)
-
-
Headers, payloads, and trailers explained
-
Relationship between PDUs and network protocols
-
Hands-on Demo:
-
Capture and analyze PDUs using Wireshark
-
Identify headers, payloads, and protocol types
-
2. Standard PDU Flows
-
Objectives: Understand normal PDU flows in Telco networks for voice, data, and signaling.
-
PDU flow during call setup and teardown (SIP + RTP)
-
PDU flow in data transmission (GTP, Diameter for LTE/5G)
-
Common network scenarios: successful transmission, retransmission, timeout
-
Layered PDU interactions across OSI/TCP-IP stack
-
Hands-on Demo:
-
Trace PDUs during a voice call or LTE data session
-
Identify normal vs abnormal flows​
-
3. Non Standard Flow of PDU
-
PDUs in multi-path routing and load balancing scenarios
-
Conditional signaling PDUs (e.g., forwarded calls, handovers in LTE/5G)
-
PDU behavior in QoS-enabled networks (priority, delay-sensitive traffic)
-
Impact of misconfigurations on security and service quality
-
Hands-on Demo:
-
Analyze PDU flows for call forwarding or handover scenarios
-
Identify anomalies and security gaps
-
4. Best Practices and Future Trends
-
PDU security in 5G, IoT, and cloud-based Telco networks
-
Automation and AI-assisted monitoring of PDUs
-
Best practices for secure PDU handling and network hardening
-
2-1 5G Protocol Analysis
-
2-2 5G IMS and Call Protocol Analysis
-
2-3 5G Kubernetes Security
-
2-4 5G Threat Hunting
WHO SHOULD ATTEND:
​
This course is designed for professionals who need to understand 5G Core architecture from a cybersecurity and risk perspective
​
-
Cybersecurity Professionals
-
Critical Infrastructure & Telco Security Teams
-
IT, OT, and Cloud Security Practitioners
-
Risk, Governance, and Compliance Professionals
-
Technical Leaders and Architects
-
Technical specialists and operators
.png)