5G and Telecom Security
RCCE students will learn the security architecture and threat landscape of telecom networks including 5G core components, signaling risks, subscriber identity concerns, slicing implications, and mobile carrier infrastructure exposure. RCCE students will learn to identify telecom attack surfaces, understand control plane and user plane risks, evaluate operational defenses, and assess how telecom compromise can affect enterprise, national, and consumer security. The course covers practical scenarios ranging from telecom architecture review to control validation and incident considerations. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing 5G and Telecom Security
- Explain Course Overview fundamentals
- Execute hands-on tasks for learning objectives
- Execute hands-on tasks for course structure — covering Understand 5G core architecture and components.
- Explain 5G Architecture Overview fundamentals — covering Service-Based Architecture (SBA), gNodeB base stations.
- Design a scalable privilege management architecture with policy and enforcement, including gNodeB base stations.
- Execute hands-on tasks for 5g core (5gc) — covering Service-Based Architecture (SBA).
- Execute hands-on tasks for ran (radio access network) — covering gNodeB base stations.
- Execute hands-on tasks for edge (mec) — covering IP/MPLS backbone.
- Execute hands-on tasks for amf — access & mobility
- Execute hands-on tasks for smf — session management
- Execute hands-on tasks for upf — user plane function — covering Packet routing and forwarding.
- Execute hands-on tasks for nrf — nf repository function — covering 5G-AKA and EAP-AKA' auth.
| Module 01 | Course Overview |
| Module 02 | Learning Objectives |
| Module 03 | Course Structure |
| Module 04 | 5G Architecture Overview |
| Module 05 | Service-Based Architecture (SBA) |
| Module 06 | 5G Core (5GC) |
| Module 07 | RAN (Radio Access Network) |
| Module 08 | Edge (MEC) |
| Module 09 | AMF — Access & Mobility |
| Module 10 | SMF — Session Management |
| Module 11 | UPF — User Plane Function |
| Module 12 | NRF — NF Repository Function |
| Module 13 | Anchor for SUPI verification |
| Module 14 | Credential generation (ARPF) |
All hands-on labs run on Rocheston Rose X OS. Students practice 5g and telecom security by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Explain Course Overview fundamentals
- Lab 2: Execute hands-on tasks for learning objectives
- Lab 3: Execute hands-on tasks for course structure
- Lab 4: Explain 5G Architecture Overview fundamentals
- Lab 5: Design a scalable privilege management architecture with policy and enforcement
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for 5G and Telecom Security, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI