5G Cyber Security

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

5G Cyber Security

5G technology is the newest form of wireless communication that promises to revolutionize the way we interact with the world around us. It promises faster speeds and lower latency, which will enable the Internet of Things (IoT) to flourish and usher in a new era of smart cities and connected devices. However, with the increased usage of 5G technology comes an increased risk of cyber security threats that must be addressed. In order to protect 5G networks, security measures must be taken to ensure that only authorized users have access to sensitive data and communications. This includes measures such as encryption, authentication, and access control. Encryption ensures that data is only readable by those with the necessary decryption key. Authentication ensures that only those with the correct credentials are able to access the network. Access control ensures that only authorized users can gain access to the network. Additionally, 5G networks must be monitored for vulnerabilities and malicious activity. Companies must employ security professionals to monitor their networks and detect any suspicious behavior. Companies must also implement preventive measures such as firewalls and intrusion detection systems to prevent malicious actors from gaining access to the network. Finally, companies must ensure that their 5G networks are regularly updated with the latest security patches. This will help to ensure that the system is always secure and up to date with the latest security protocols. Overall, 5G technology is an exciting advancement that will revolutionize the way we interact with the world around us. However, with the increased usage of 5G technology comes an increased risk of cyber security threats that must be addressed. Companies must take the necessary steps to ensure that their 5G networks are secure and remain that way.

Introduction to 5G cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.

Introduction to cyber-security 5G

  • Cyber-attack chain
  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and Control
  • Actions on Objective

Virtualization on VirtualBox

  • Kali Linux
  • Install, deploy and run Kali Linux
  • Installation and deployment of vulnerable server for testing


Information gathering

Assess security vulnerabilities

Scanning engines

  • Nmap scanning

Search engine scanners

Internet scanners

  • Google search engine

Open-source intelligence

  • Recon-ng scanning

Security standards

Center for Internet Security (CIS)

Hardening checks for systems


Metasploit framework for ethical hacking

  • Basic commands and usage
  • Module exploration
  • Search for vulnerabilities from scanning results
  • Exploitation of systems
  • Post-exploitation for privilege escalation and scanning

Security hardening and configuration

Social engineering

  • Dark Web with Tor
    • Hacking groups and forums
  • Wireless security assessment with WiFi PineApple
    • Wireless vulnerabilities
  • Social Engineering Toolkit (SET) attacks
  • Direct attacks into Windows 10 with Macros and Powershell

Web, application, and database vulnerabilities

Open Web Application Security Project (OWASP) top 10

  • Injection
  • Broken authentication
  • Sensitive data exposure
  • XML External Entities
  • Broken access control
  • Security misconfiguration
  • Cross-Site Scripting
  • Insecure Deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring

Full SQLMAP tutorial for web penetration testing

BurpSuite tutorial for manual injection on web penetration testing

Payload testing with custom load

Creation of payload

  • Payloads package on injection
  • Fully undetected payloads
  • Buffer overflow for shell

Come join thousands of students who have learned from the top ethical hacking and penetration testing instructor, Loi Liang Yang, now!

Show More

Course Content

Security Course lectures

  • 5G Security: A Shared Responsibility
  • R&S Thirty-Five: 5G security aspects
  • CISA Webinar: 5G Security and Vulnerabilities
  • 4G to 5G Evolution: In-Depth Security Perspective
  • Webinar: 5G Security Briefing
  • yes, your phone is already hacked
  • 5G Security Evolution | Vadim Paryev | Swisscom
  • New Vulnerabilities in 5G Networks

Student Ratings & Reviews

No Review Yet
No Review Yet