
Cyber 5G Series - 5G Secure Administration
COURSE SYNOPSIS:
This course provides a high-level overview of the 5G Core with a focus on cybersecurity implications in modern telecommunication networks. It examines key 5G characteristics and how virtualization and cloud-native design expand the network attack surface while also enabling stronger security controls.
Learners will explore security considerations around Network Function Virtualization (NFV), including isolation, trust boundaries, and orchestration risks. The course highlights how network slicing and DNNs affect segmentation, access control, and policy enforcement, and how misconfigurations can lead to cross-slice or data exposure risks.
Why These Skills Matter?
5G networks are the backbone of critical services across healthcare, finance, transportation, and national defense. They are highly distributed, cloud-native, and software-defined, introducing new attack surfaces and operational complexities. Skills in 5G administration, network function lifecycle management, monitoring, and orchestration are essential for cybersecurity professionals to ensure network resilience, detect anomalies, and respond effectively to incidents.
Understanding 5G security, identity and access management, network slicing, and edge computing also ensures compliance with regulatory requirements and strengthens end-to-end protection. These skills bridge IT, OT, and telecom domains, enabling professionals to advise on secure 5G adoption, mitigate cyber risks, and support business innovation in next-generation networks.
Entry requirements
-
Min. 3 GCE ‘O’ Level Passes or WPL Level 5
-
Basic computer skills
-
Min. 1 year of work experience
This course equips you with the skills to operate, monitor, and secure 5G networks in today’s complex, cloud-native, and distributed environments. You’ll learn how to manage network functions, identity and access, network slicing, and edge deployments while understanding the cyber risks unique to 5G.
By joining, you’ll gain the expertise to detect and respond to threats, ensure regulatory compliance, protect critical infrastructure, and confidently support safe 5G adoption and innovation within your organization.
COURSE DURATION:
-
3 days of Instructor-led training
EXPECTATION AFTER THE TRAINING
-
Operational Competence: Understand 5G Core architecture, network functions, and their management, enabling effective day-to-day administration and monitoring.
-
Cybersecurity Awareness: Identify and mitigate risks across 5G networks, including slicing, MEC, and cloud-native components.
-
Incident Response Skills: Detect, analyze, and respond to security incidents using monitoring tools, NMS platforms, and SOC integrations.
WHAT WILL BE COVERED IN THE COURSE:
1. 5G Network Architecture Administration
-
Understanding logical components of the 5G Core (AMF, SMF, UPF, AUSF, NRF, etc.)
-
Managing control plane vs user plane separation
-
Awareness of service-based architecture (SBA) and inter-NF communication
-
Dependency mapping between network functions for operations and incident response
2. Network Function & Application Administration
-
Lifecycle management of Network Functions (NFs)
-
Deployment, scaling, upgrades, and decommissioning
-
Configuration management for cloud-native NFs (VMs, containers)
-
Version control and patch management of telecom applications
-
Understanding orchestration platforms (MANO, Kubernetes, OpenStack)
3. Identity, Access, and Subscriber Administration
-
Subscriber identity concepts (SUPI, SUCI, IMSI evolution)
-
Authentication and authorization flows in 5G
-
Role-based access control (RBAC) for network operations staff
-
Privileged access management for administrators and operators
4. Introduction to Nokia NMS (Network Management System)
-
Discussion about Mantay Ray
-
How it is organised and how to review it for security purpose.
-
How to use it to detect attack.
5. Security Administration
-
Configuration of 5G security features (encryption, integrity protection)
-
Certificate and key management
-
Security policy definition across slices and NFs
-
Monitoring and logging configuration for security visibility
-
Integration with SOC, SIEM, and detection platforms
6. Incident Response Process for Telco
-
Methodology for Incident Response
-
Detection and Analysis
-
Roles and Responsibilities
-
Communications and Reporting
-
1-1 5G Fundamentals
-
1-2 5G Administration
WHO SHOULD ATTEND:
​
This course is designed for professionals who need to understand 5G Core architecture from a cybersecurity and risk perspective
​
-
Cybersecurity Professionals
-
Critical Infrastructure & Telco Security Teams
-
IT, OT, and Cloud Security Practitioners
-
Risk, Governance, and Compliance Professionals
-
Technical Leaders and Architects
-
Technical specialists and operators
.png)