This course provides a detailed description of several surveillance techniques that can be exploited in many 2G,3G and 4G cellular systems. The techniques described are not purely based on the Radio Access part of these networks, however this aspect is discussed in considerable detail during the course. Exploitation via Core Network and Third Party Services is also presented, and examples of Service Provider architectures discussed.
Covert Cellular Surveillance
There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.
Several sanitised case studies will be presented and the topics are delivered from several perspectives, including:
- Ease of deployment
- Risk of visibility
- Protection against being 'spoofed'
- Denial of service
- Setting the Scene - the state of the cellular industry
- Network architecture evolution
- Understanding cellular principles and procedures
What can be exposed?
- Different systems - different vulnerabilities
- Understanding the network and the environment
- Radio access exploitation:
- grab and go
- holding on
- on the move
- closing in
- Backhaul / Fronthaul exposure
- What goes on in the Core Network
- Third Parties and Transit networks
- Voice, Data and BIG data
- Case Studies
This course is authored by QA
Receive classroom training at one of our nationwide training centres, or attend remotely via web access from anywhere.
Find dates and prices
Online booking is currently not available for this course, to find out more please call us on 01753 898320 or email us at email@example.com to discuss how we can help.
Fully accredited to ensure we provide the highest possible standards in learning