0(0)

5G Cyber Security

  • Course level: Intermediate

Description

Introduction to 5G cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.

Introduction to cyber-security 5G

  • Cyber-attack chain
  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and Control
  • Actions on Objective

Virtualization on VirtualBox

  • Kali Linux
  • Install, deploy and run Kali Linux
  • Installation and deployment of vulnerable server for testing

Reconnaissance

Information gathering

Assess security vulnerabilities

Scanning engines

  • Nmap scanning

Search engine scanners

Internet scanners

  • Google search engine

Open-source intelligence

  • Recon-ng scanning

Security standards

Center for Internet Security (CIS)

Hardening checks for systems

Exploitation

Metasploit framework for ethical hacking

  • Basic commands and usage
  • Module exploration
  • Search for vulnerabilities from scanning results
  • Exploitation of systems
  • Post-exploitation for privilege escalation and scanning

Security hardening and configuration

Social engineering

  • Dark Web with Tor
    • Hacking groups and forums
  • Wireless security assessment with WiFi PineApple
    • Wireless vulnerabilities
  • Social Engineering Toolkit (SET) attacks
  • Direct attacks into Windows 10 with Macros and Powershell

Web, application, and database vulnerabilities

Open Web Application Security Project (OWASP) top 10

  • Injection
  • Broken authentication
  • Sensitive data exposure
  • XML External Entities
  • Broken access control
  • Security misconfiguration
  • Cross-Site Scripting
  • Insecure Deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring

Full SQLMAP tutorial for web penetration testing

BurpSuite tutorial for manual injection on web penetration testing

Payload testing with custom load

Creation of payload

  • Payloads package on injection
  • Fully undetected payloads
  • Buffer overflow for shell

Come join thousands of students who have learned from the top ethical hacking and penetration testing instructor, Loi Liang Yang, now!

Topics for this course

8 Lessons

Security Course lectures

5G Security: A Shared Responsibility5:15
R&S Thirty-Five: 5G security aspects36:27
CISA Webinar: 5G Security and Vulnerabilities56:18
4G to 5G Evolution: In-Depth Security Perspective46:46
Webinar: 5G Security Briefing1:04:49
yes, your phone is already hacked6:19
5G Security Evolution | Vadim Paryev | Swisscom1:04:45
New Vulnerabilities in 5G Networks43:36
Free

Material Includes

  • Course videos
  • Certificate of Completion

Enrolment validity: Lifetime

Requirements

  • Passion to learning
  • Basic technical knowledge
  • Willing to implement what you learn

Target Audience

  • For Beginners to pros interested in learning 5G Security
  • For Beginners to pros interested in learning ethical hacking
  • For all engineers working in the telecom sector
  • For all researchers in the telecommunication domain
  • For university engineering students interested in 5G technologies
  • For tech-savvy personals from both academia and industry