Completed
Supported by Network Slicing and Virtualization
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Demystifying 5G Security through Threat Modeling
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What is 5G ?
- 3 Generations of Mobile Technologies
- 4 5G Features - Performance
- 5 56 Features - Technology Revolution
- 6 Supported by Network Slicing and Virtualization
- 7 5G Security - Radio Access Network
- 8 5G Security - Core Network - Service-based Architecture
- 9 5G Security - Trust Model
- 10 5G Security - Multi-Access Edge Computing (MEC)
- 11 5G Security - Key Elements
- 12 5G Security Challenges
- 13 The Threat Modeling Process
- 14 Threat Actors
- 15 Threat Actions - STRIDE + LM
- 16 Threats (Actors Performing Actions)
- 17 Threat Model for a Specific Use Case
- 18 Sample Threat Table for the Use Case
- 19 Sample Risk Assessment and Disposition
- 20 5G Threats - Major Mitigating Controls
- 21 Apply What You Have Learned Today
- 22 References