About this course

Course type Premium
Course code QACYCCS
Duration 2 Days

This course provides a detailed description of several surveillance techniques that can be exploited in many 2G,3G and 4G cellular systems. The techniques described are not purely based on the Radio Access part of these networks, however this aspect is discussed in considerable detail during the course. Exploitation via Core Network and Third Party Services is also presented, and examples of Service Provider architectures discussed.


There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.

Delegates will learn how to

Several sanitised case studies will be presented and the topics are delivered from several perspectives, including:

  • Ease of deployment
  • Risk of visibility
  • Protection against being 'spoofed'
  • Denial of service


Module 1

  • Setting the Scene - the state of the cellular industry
  • Network architecture evolution
  • Understanding cellular principles and procedures

Module 2

  • What can be exposed?

    • Identity
    • Location
    • Mobility
    • Profile
    • Metadata
Module 3

  • Different systems - different vulnerabilities
  • Understanding the network and the environment
  • Radio access exploitation:
    • grab and go
    • holding on
    • on the move
    • closing in

Module 4

  • Backhaul / Fronthaul exposure
  • What goes on in the Core Network
  • Third Parties and Transit networks
  • Voice, Data and BIG data
  • Case Studies
Premium Course

2 Days


This course is authored by QA

Delivery Method

Delivery method

Classroom / Attend from Anywhere

Receive classroom training at one of our nationwide training centres, or attend remotely via web access from anywhere.

Find dates and prices

Online booking is currently not available for this course, to find out more please call us on 01753 898320 or email us at info@qa.com to discuss how we can help.

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.