Early bird registration rate ends on the 31st of January
The cellular network plays a major role in providing vital wireless connectivity to todayโs digital equipment. However, wireless connectivity also attracts adversaries interest to carry out cybersecurity attacks. For example, owning mobile phones and connected cars via exploiting cellular baseband or attacking cellular networks via compromised a base station or mobile device. With upcoming 5G networks, there will be more devices connected with cellular connectivity and the network itself to become national critical infrastructure.
Our intermediate level training gives hands-on training on understanding the potential risks associated with cellular network connectivity. In particular, we begin with the security architecture of 3G and 4G cellular network, software/hardware tools to debug commercial networks and devices, setting up test 3G/4G network platform for communicating with commercial devices, and practical attacks against the cellular networks and devices. The training concludes with 5G security architecture and vulnerabilities with practical examples.
IT security background and with minimal knowledge on wireless communications in general.
Note: Our training complies to local radio laws and regulations, as we use a special type of radio devices. For all lab experiments, we carry out network setup and attacks using special wired connectors and avoid any kind of wireless transmissions.
Dr. Ravishankar Borgaonkar
Altaf Shaik