top of page
CXC-Logo-(colour2).png
abstract connections_edited_edited.jpg

Cyber 5G Series - Threat Hunting

COURSE SYNOPSIS:

This course equips cybersecurity professionals with the knowledge and skills to proactively detect, investigate, and mitigate threats in 5G networks. Participants will gain a clear understanding of 5G architecture, including core, RAN, MEC, network slicing, and cloud-native components, and learn how these elements influence the threat landscape.

 

The course covers threat hunting principles, methodologies, and best practices tailored to 5G, including the use of NMS, EDR, NDR, and SIEM tools for monitoring and detection. Hands-on labs and simulated attack scenarios allow participants to practice identifying indicators of compromise, hunting for malicious activity, and responding effectively to incidents. By the end of the course, attendees will be equipped to proactively defend 5G networks, strengthen operational security, and contribute to resilient and secure next-generation telecom environments

This training equips telco engineers, DevOps, and cybersecurity professionals with the knowledge and skills to securely deploy, manage, and monitor Kubernetes clusters for 5G networks. Participants will learn not only the fundamentals of Kubernetes and containerization but also the administration, monitoring, and security practices critical for resilient and compliant 5G operations.

Why These Skills Matter?

 

5G networks are critical infrastructure, supporting healthcare, finance, transport, smart cities, and defense systems. Their distributed, cloud-native, and software-defined architecture introduces new and complex attack surfaces that traditional security approaches may not cover. Threat hunting skills enable cybersecurity professionals to proactively identify and mitigate threats before they escalate into serious incidents.

 

These skills also help organizations maintain regulatory compliance, protect sensitive subscriber data, and ensure service continuity. By understanding the unique risks of 5G, including network slicing, MEC, and service-based architectures, professionals can strengthen end-to-end security, reduce operational risk, and support safe innovation in next-generation telecom networks.

 

Entry requirements

  • At least 3 years of cyber security experience

  • Min. 1 year of work experience in telecommunication

  • Been through T1-1 and T1-2 course in CyberXCenter, knowing the basic fundamentals of Telecommunication network

 

 

For those overseeing telecom personnel, these skills are also crucial for guiding secure operations, enforcing best practices, and mentoring teams on emerging risks. Understanding the 5G threat landscape allows cybersecurity leaders to coordinate defense strategies, implement effective monitoring, and maintain operational resilience, ensuring that both the network and the people managing it are prepared for real-world threats.

 

 

COURSE DURATION:

  • 3 days of Instructor-led training

 

 

 

EXPECTATION AFTER THE TRAINING:

​

  • Proactive Threat Detection: Ability to identify and investigate anomalies, indicators of compromise (IoCs), and suspicious activity across 5G networks.

  • Understanding 5G Security Architecture: Clear comprehension of 5G Core, RAN, MEC, network slicing, and cloud-native components, and their implications for cybersecurity.

  • Use of Security Tools: Competence in leveraging NMS, SIEM, EDR, and NDR tools for monitoring, threat analysis, and incident response in a 5G environment.

  • Incident Response Readiness: Capability to contain, mitigate, and document incidents effectively, coordinating with operational teams and SOCs.

 

 

 

WHAT WILL BE COVERED IN THE COURSE:

 

1. Threat Hunting Principles & Methodologies

  • Fundamentals of proactive threat hunting

  • Hunting vs. reactive incident response

  • Threat intelligence sources and mapping to 5G networks

 

2. Monitoring and Detection in 5G

  • Leveraging NMS, EDR, NDR, and SIEM for 5G

  • Indicators of compromise (IoCs) and attack patterns

  • Log aggregation and analysis across core, edge, and transport layers

 

3. 5G Attack Scenarios & Hunt Techniques

  • Network slice exploitation and lateral movement

  • MEC compromise detection and mitigation

  • API and service-based architecture attack detection

  • Real-world 5G attack case studies

 

4. Tools and Platforms for 5G Threat Hunting

  • Security analytics platforms in telecom

  • Using Nokia NMS and Mantay Ray for anomaly detection

  • Open-source and commercial threat hunting tools

 

5. Hands-On Labs and Simulations

  • Conducting threat hunts in a simulated 5G environment

  • Creating and using IoCs for proactive detection

  • Red/Blue team exercises targeting 5G network functions

 

6. Reporting, Mitigation, and Lessons Learned

  • Incident documentation and evidence preservation

  • Communicating findings to stakeholders

  • Continuous improvement of threat hunting processes

 

7. Future Trends in 5G Security

  • Emerging threats with 5G standalone networks

  • AI/ML for automated threat detection

  • Preparing for 6G and converged IT/OT/5G security challenges

  • 2-1 5G Protocol Analysis

  • 2-2 5G IMS and Call Protocol Analysis

  • 2-3 5G Kubernetes Security

  • 2-4 5G Threat Hunting

WHO SHOULD ATTEND:

​

This course is designed for professionals who need to understand 5G Core architecture from a cybersecurity and risk perspective

​

  • Cybersecurity Professionals

  • Critical Infrastructure & Telco Security Teams

  • IT, OT, and Cloud Security Practitioners

  • Risk, Governance, and Compliance Professionals

  • Technical Leaders and Architects

  • Technical specialists and operators

bottom of page